July 17, 2023 IoT Inventory The Internet of Things (IoT) has added internet connections to lots of home devices. Each and every one of those devices runs software on…
July 10, 2023 National Cyber Strategy After lengthy negotiations and revisions, the White House has finally released its National Cybersecurity Strategy document, outlining it’s priorities and goals. It’s a wide-ranging…
July 3, 2023 Access Backup Plan You’re using a password manager. You’re even using two-factor authentication. Great! When done properly, this will keep the bad guys out. Unfortunately, if you’re…
June 26, 2023 Hacking in Space Right now there are thousands of satellites orbiting above our heads performing crucial tasks. At the end of the day, they’re just computers running…
June 19, 2023 Go Forth, Do Good Deeds I launched my mission to improve people’s privacy and security almost ten years ago now. It’s been quite a journey and I’ve learned a…
June 12, 2023 Making a Difference At some point, when you care enough about a particular cause, you shift from following the issue to actually trying to advance the issue…
June 5, 2023 Blocking .zip Domains Two weeks ago, I told you about the availability of two new top-level domains that also happen to be popular file name extensions: .zip…
May 29, 2023 Vehicle Privacy Report Modern cars are more like smartphones on wheels. Like our cell phones, they are chock full of sensors, computer chips and software, and they’re…
May 22, 2023 Problems with Passkeys Everyone hates dealing with passwords. This has led to a mad search for ‘password-killer’ technology. After several failed attempts, there’s finally a worthy contender:…
May 15, 2023 Probing the Ministry of Truth In the book “1984” (published in 1949), George Orwell envisioned a Big Brother that would control the media and dictate what was “truth”. But…