06 Jul 2015

Can You Trust Google’s Project Fi?

The price is right for Google’s bargain cellular service called Project Fi – the question is can you trust it? How secure is it? First the price: $20 monthly buys you unlimited domestic talk and text, unlimited international text, low cost international calling (2 cents/minute to call an Australian landline' 0
30 Jun 2015

After the Breaches: The Even Worse News about the Chinese Hacks

For the past year newspaper headlines have screamed about major data breaches at big retailers (Target), huge health insurers (Anthem), and big government (the United States’ Internal Revenue Service, also the massive breach of employee records at the Office of Personnel Management, OPM). Note:  there may be more press coverage' 0
24 Jun 2015

Advanced, Persistent, Threatening: How APTs Work and Why We Can’t Stop Them

Some companies deserve to get hacked. They do stupid things. They leave the default password on an internet connected device, they turn off automated warnings on their security software, or they store unencrypted customer data. Those are some of the cardinal sins of information security, and anyone who commits them' 0
16 Jun 2015

Billboards, Porn, And Why Everything Is So Easy To Hack

I assure you that this article has a point, which I will get to shortly. First, however, let’s talk about Goatse. DO NOT GOOGLE THE PRECEDING TERM. If that warning came too late, I apologize. If you already know what it is, I pity you. If you haven’t seen Goatse,' 0
09 Jun 2015

My Computer Is More Secure Than Yours

Suck it up:  my computer is more secure than yours.  That is a bold, flat-out claim but it also is true. That is because I use the Google powered ChromeBook, have for four years since the laptops debuted in mid-2011.  The machines – which start at $200 US — run' 0
03 Jun 2015

The Myth of iPhone Security Invulnerability

Your iPhone is no more secure than my Android. Nine words that are a slap in the face to many iPhone users, a lot of whom believe that their Apple phone has some kind of built-in magical shield that wards off cyber-attacks. It doesn’t. What’s more, there is an easy' 0