Category: How-To

Hacking a Network Using a Malicious Fax

If you have a combination printer/fax machine, your network is probably vulnerable to a single, malicious fax. A security research company named Check Point released a report last week that detailed how HP printers with built-in fax capability could be hacked by sending it a specially formatted fax. While the study focused on HP printers,

The “S” in IoT is for Security

The Internet of Things (IoT) promises all sorts of cool new features for our previously "dumb" devices, allowing them to be controlled from anywhere on the planet. But because the compete on cost, security is lax or nonexistent. If you're going to bring these devices into your home, you need to keep them walled off.

It’s Time to Delete Facebook

Facebook, I’m breaking up with you… It’s not me… it’s you. In the last few weeks, Facebook has been rocked by one scandal after another. First the Cambridge Analytica thing, then the “Ugly Truth” memo, and then news that it’s been saving all your text messages and call info. But these are just the latest

Preventing Tax Return Fraud

It’s that time of year again: tax time! And that means it’s also high season for identity thieves and scammers. Millions of people are affected by fake tax return filings every year. And while we’re talking about tax return fraud, we should take the opportunity to discuss some other tax and Social Security scams, as

Data Privacy Day: Your Checklist

[UPDATED 1/25/2020] I’ve removed the introduction to this list. If you’re not already convinced that privacy is a basic human right and that we (as consumers and as citizens) need to actively demonstrate our desire for privacy, read this. Action Plan Here’s your action plan for Data Privacy Day. You can do all of this

Take Out the Trash… Securely!

I just read an entertaining and interesting story that was published about 16 years ago in Willamette Week, an indie newspaper in Portland, OR. This article was published shortly after 9/11 and the sweeping new government surveillance powers that came as a result. In particular, the article discussed a rather disturbing investigative technique used by

Fixing the Apple Root Bug (Permanently)

It’s been a pretty bad week for Apple software, both for their macOS computer software and their iOS smartphone and tablet software. But today I’m going to focus on a truly horrendous software bug that somehow slipped through Apple’s normally stellar quality control process. This one screw up could allow someone to quickly and easily

Evading Malware with Quad9

[Update 2019-04-07: While Quad9 is still a good option, you should check out Cloudflare’s 1.1.1.1 service which will come with a new free VPN service called Warp.] Evading malware can be difficult these days. The bad guys are very clever and surfing the Internet involves several complicated technologies. Software is rife with bugs and traps