ev-password-shutterstock-132226805
26 Jan 2016

In Case You Were Wondering, Here’s How to Store Passwords Correctly

Every article on passwords must start by discussing the same subject, so here it is: You’ve chosen a weak password, and deployed it unwisely. This article, however, doesn’t choose password formation as its primary focus. There has been a flurry of activity in the news lately about users who’ve been

0 Read More
shutterstock_92305813
29 Dec 2015

If You Live In the US, Your Vote Is Being Hacked

Politicians, their staff, and those organizations that support their campaigning efforts should be among the last people to get their hands on American data. This, if nothing else, should be your takeaway from the most recent chapter of the 2016 presidential election. No matter who you’re voting for, (Full disclosure:

0 Read More
shutterstock_136413251
22 Dec 2015

The Internet of Hackable Things

There is a smartphone that you can buy for twenty dollars now. You wouldn’t want to buy it — as a phone, it fails horribly in terms of usability and ergonomics — but it embodies the idea of a smartphone in every way. It has a touchscreen, a camera, a

1 Read More
shutterstock_160092758
01 Dec 2015

The World’s Governments Cannot End Terror Attacks with Mass Surveillance

It doesn’t matter where you live, or what time in history you happen to have lived. Whenever something bad happens to your country, your government will react — overreact — in a way that is ultimately counterproductive. Here’s an example:  in 1798, less than ten years after the US constitution

2 Read More
1adblocker_shutterstock
17 Nov 2015

Blocking Ad-Blockers on Websites Has Backfired Predictably

The internet, as many lawmakers, entrepreneurs, and lawyers have discovered to their sorrow, is not a place that is easily governed by rules. Shutting down a service you don’t like only means that within days, a dozen competing entities will grow up to fill the gap. Remember how shutting down

0 Read More
shutterstock_147650813
27 Oct 2015

T-Mobile Hack Exposes Continued Risk of Working With Vendors

Approximately one-third of successful cyberattacks are accomplished via the compromise of an insecure vendor. This is, to use a technical term, absolutely nutso. Imagine that you’re a large company. You’re doing everything right, in terms of information security. You’ve got three kinds of firewalls, a stable of well-paid analysts, and

0 Read More