More on Biometrics and Privacy
Last time I wrote about Biometrics and Privacy. Part of that involved the training of the networks needed to recognize individuals either for authentication or in images. A good description of the process of “training” the networks to recognize the images is the third part of the Medium series I referenced then. As the article […]
Information Leakage From Radio-Frequency Emissions
If you’ve taken Learning Tree’s introduction to cybersecurity course, you may remember that it explains some ways attackers can see what a user types on a keyboard. Those are examples of “information leakage”. It also may be possible for an attacker to use an inexpensive USB radio dongle device or even-WiFi to capture and decode […]
How Should I Dispose of My Old Electronics (That May Have Passwords In Them)?
Recycling is good. I even wrote about recycling your devices a couple of years ago. Just recently the US Computer Emergency Readiness Team or US-CERT (part of the US Department of Homeland Security – DHS) issued Security Tip ST18-15 on Proper Disposal of Electronic Devices. Given that new “Tip” and the fact that this is […]
What If Your Child’s (Or Your) School Doesn’t Teach Coding?
A parent at a recent meeting I was attending lamented that her child’s school no longer taught coding. I was blessed that my high school offered classes in programming back in 1973. I wrote about that six years ago on this blog. Today, I’d like to offer some suggestions to that parent and to any […]
HTTPS Secures Site Traffic From Eavesdropping, But Who Can We Trust?
Encrypting data is essential in helping ensure its confidentiality. October is National Cybersecurity Awareness Month in the US and the theme for the third week is “It’s Everyone’s Job to Ensure Online Safety at Work”. We all use encryption when we surf the web, but it is not as simple as it might seem, and […]