Mind the Metadata

One of the major perks of modern smartphones is the built-in camera. When was the last time you actually carried (or bought) a separate camera? I used to love the little Canon Elph cameras because they were small enough to carry around on a belt holster. But it’s gathering dust now because my iPhone arguably

TikTok Boom

If you haven’t heard of TikTok, you’re probably not a teen. This relatively new social media service is very popular with the younger generation. It’s been downloaded 1.5 billion times. With this app, you can share short videos and … well, you know, goofy social media stuff. I’m old. I don’t get it, either. The

Bad Netgear Router Bug

If you have a Wi-Fi router made by Netgear, you need to pay close attention to this one. Most Netgear routers (79 models), even as old as 2007, are vulnerable. According to a report by security research firm Trend Micro, Netgear routers have a flaw that could allow a remote attacker (anywhere on the internet)

We’re Being Scanned

(This one is going to get a little technical, but hang with me.) Your WiFi router is the main portal to your home network. Most of us think of it as just a box that gives us a wireless connection, but this box almost always contains a firewall, as well. A firewall normally acts like

Beware the Evil Maid (Thunderspy)

Securing a computer on the internet today is hard enough. But trying to secure a computer against someone with direct physical access is a lot harder. This is the so-called “evil maid” attack: you leave your laptop in your hotel room, giving the maid unfettered access. But this can also be the “evil contractor” attack

Good Articles to Read

There’s not much going on with respect to cybersecurity, other than the usual stuff. There have been several bugs found recently in Chrome, iOS/macOS, Office 365, Microsoft Teams… you name it. But the response to each of these is the same: update the software. So keep on top of your software updates! I’ve been reading

Privacy-Preserving Contact Tracing

Apple and Google have proposed a method of doing contact tracing using the Bluetooth on our smartphones. It’s done using fancy cryptography and such, but I wanted to explain the basic mechanics in a simple way. Skip down to the bottom if you just want that part. We are all now learning way more about

Secure & Private Zoom Alternatives

During our global COVID-19 self-quarantining, video conferencing usage has exploded. I’ve tried to find hard statistics, but they’re rising so fast that anything I post now will be stale tomorrow. That said, I’ve seen usage growth figures as high as 400%. And since we’re all staying home now (right?), video chatting is a great way