SMS is old, clunky, and not secure. RCS will be prettier, but still won’t be secure. That is, it won’t have true end-to-end encryption(E2EE) by default. Apple’s Messages have E2EE by default (between Apple devices), but Apple holds the keys. WhatsApp has E2EE, but ever since it was bought by Facebook, it can’t be considered
Zoom went from an obscure teleconferencing company to a household word (a verb) when the pandemic hit. Zoom wasn’t the best videoconferencing app by any means. It lacked many key features like true end-to-end encryption and had some serious data oversharing problems. But Zoom was dead simple to use and kinda fun to say. For
October is National Cybersecurity Awareness Month! This tradition started 17 year ago, and each year they have a theme. This year, the theme is “Do Your Part. #BeCyberSmart.” Okay, that’s catchy but vague. For each week of this month, they have… sub-themes, I guess you would call them. I’ve decided to cover the highlights here
If the upcoming contentious election weren’t enough to put us on guard (given the foreign influence campaigns in the 2016 election), we now have a pandemic that has suddenly infiltrated the highest levels of the US government. In the next two months, you should fully expect to see concerted efforts by various people and groups
I’ve made my opinion pretty clear on what I feel are the pros and cons of modern antivirus software. But even the best AV tools can’t be 100% perfect. So what if you get that file attachment and you want to be extra sure that it’s safe to open? Where can you go to get
The old expression “like finding a needle in a haystack” is usually uttered in frustration, like it’s a bad thing. But today I’m going to give you at least one case where you want that haystack to be huge… massive, even. Because the needle you’re hiding in that haystack is your password. Source of Inspiration
If you haven’t heard of TikTok, you’re probably not a teen. This relatively new social media service is very popular with the younger generation. It’s been downloaded 1.5 billion times. With this app, you can share short videos and … well, you know, goofy social media stuff. I’m old. I don’t get it, either. The
If you have a Wi-Fi router made by Netgear, you need to pay close attention to this one. Most Netgear routers (79 models), even as old as 2007, are vulnerable. According to a report by security research firm Trend Micro, Netgear routers have a flaw that could allow a remote attacker (anywhere on the internet)
(This one is going to get a little technical, but hang with me.) Your WiFi router is the main portal to your home network. Most of us think of it as just a box that gives us a wireless connection, but this box almost always contains a firewall, as well. A firewall normally acts like
Securing a computer on the internet today is hard enough. But trying to secure a computer against someone with direct physical access is a lot harder. This is the so-called “evil maid” attack: you leave your laptop in your hotel room, giving the maid unfettered access. But this can also be the “evil contractor” attack