Beware of Online Extortion
“We’ve been watching your browsing and…” begins yet another ransomware email. The ones I receive allege that they have my password from a porn site (I’ve never visited one), they’ve compromised my router and seen the porn I watch (again, I don’t), and that they know the password for my email server (I’ve never used […]
More on Biometrics and Privacy
Last time I wrote about Biometrics and Privacy. Part of that involved the training of the networks needed to recognize individuals either for authentication or in images. A good description of the process of “training” the networks to recognize the images is the third part of the Medium series I referenced then. As the article […]
Information Leakage From Radio-Frequency Emissions
If you’ve taken Learning Tree’s introduction to cybersecurity course, you may remember that it explains some ways attackers can see what a user types on a keyboard. Those are examples of “information leakage”. It also may be possible for an attacker to use an inexpensive USB radio dongle device or even-WiFi to capture and decode […]
How Should I Dispose of My Old Electronics (That May Have Passwords In Them)?
Recycling is good. I even wrote about recycling your devices a couple of years ago. Just recently the US Computer Emergency Readiness Team or US-CERT (part of the US Department of Homeland Security – DHS) issued Security Tip ST18-15 on Proper Disposal of Electronic Devices. Given that new “Tip” and the fact that this is […]
What If Your Child’s (Or Your) School Doesn’t Teach Coding?
A parent at a recent meeting I was attending lamented that her child’s school no longer taught coding. I was blessed that my high school offered classes in programming back in 1973. I wrote about that six years ago on this blog. Today, I’d like to offer some suggestions to that parent and to any […]