I was approached by the continuing education group at Duke University to give a lecture on computer security and privacy, which I did last October. It was quite the hit and I will now be teaching a 6-week course for Duke on the same topic, starting mid-April of 2016! I’m very excited! I’m planning to
LastPass is the password manager I recommend in my book and to anyone who asks. While there are a handful of good products like it, to me LastPass has a rock-solid security story and all the features anyone could want. You may have heard last week about a threat to LastPass called “LostPass” on the
[Updated: July 2019] Identity theft is arguably one of the worst things that can happen to a person, financially. When someone steals your identity, they can basically do anything you can do – including obtaining loans or credit cards in your name. And when the spending spree is over, you are left holding the bag.
If you use a Windows computer at all, you’ve probably seen that annoying little pop-up message that keeps reminding you that Windows 10 is coming. Windows 10 is a free upgrade for most people and Microsoft is clearly banking on most people taking the Trojan horse free software. Microsoft is also counting on most people
Uninstall Flash Player In my book, I made it clear that the Flash Player (that little browser plugin that you’re constantly having to update due to new security bugs) is one of the prime targets of hackers. In the last week, in the wake of the Hacking Team being hacked, there have been no fewer
LastPass has notified its users that it experienced some “suspicious behavior” on their servers and they believe that “email addresses, password reminders, server per user salts, and authentication hashes were compromised”. They also made clear that “we have found no evidence that encrypted user vault data was taken, nor that LastPass user accounts were accessed”.
Sorry for the long break between posts. Lots going on for me right now. I would encourage you to have a look at my Twitter feed to keep track of key updates. It’s about the only thing I’ve kept up on lately. https://twitter.com/WawaseeMedia
I finally got around to finishing Bruce Schneier’s latest bestseller: Data and Goliath. I’ve read a few of Bruce’s books over the years (and own most of the rest, waiting patiently to be read). I’ve watched Bruce on many TV news segments, lectures, interviews, and web videos. I follow his blog and Twitter posts. I’ve
For over two decades, the prevailing utility for sending and receiving encrypted files was PGP (Pretty Good Privacy) – including the popular free and open-source implementation GNU Privacy Guard (GPG). In order to use PGP, you needed to use a software tool to create at least one pair of encryption keys: one public (which you
Here are some top stories from the last month: The FREAK bug. You can read the in-depth info here, but the gist of this is that a “man in the middle” could force an encrypted HTTPS web connection to use really old and really weak encryption, thus allowing someone (probably the man in the middle)