Friend of mine, a smart journalist, had his iPad stolen. He couldn’t help that — the thief broke into his house. But his private, personal data wasn’t stolen, exactly. Donated, more like. He had no passcode set on the iPad. All his email, calendar, address book, and work documents were free for the taking. Oh, yeah. He had the iPad …
Unsettling developments, on several fronts:
U.S. surveillance. The Obama administration, once again, is reaching farther than its predecessor on electronic surveillance. Now it wants a law requiring internet service providers to keep logs of their customers on the web — all of them, not suspected bad actors — just in case the …
We’ve seen cyberwar declared before, but the one playing out in Egypt is my own candidate for World Web War I. Hosni Mubarak fired the first shot, switching off the internet and mobile phones after crude attempts to block Twitter and Facebook fell apart. The web fought back in ways we haven’t seen before, and it’s winning.
It no …
Updated 2:30 pm near bottom of post, to clarify recipient of a letter from Yahoo’s lawyers.
The tech world is abuzz with a remarkable display of backbone by Twitter in the Wikileaks case. It deserves wider notice.
Federal prosecutors want to indict Julian Assange for making public a great many classified …
After writing my last post on the way McAfee took me for a ride – charging me for five years of license renewals after I uninstalled its software – I heard pretty quickly from Francie Coulter, McAfee’s Director of WW Consumer Public Relations. On the plus side, there was no bluster. She apologized and offered a full refund. On the minus …
Here’s a little story about an inattentive customer and the price of inattention. I play the sucker. The company that takes me for a ride is a surprise casting choice: McAfee, a reputable security vendor. McAfee’s anti-virus software is an industry standard, even if reviewers have been saying since last year that Microsoft’s free …
One common puzzle for the security-minded is how to work with confidential data on the road. Sometimes you can’t bring your laptop, or don’t want to. But working on somebody else’s machine exposes you to malware and leaves behind all kinds of electronic trails. Even if you keep your files on a portable drive, Windows will scatter …
“Social engineering,” the fancy term for tricking you into giving away your digital secrets, is at least as great a threat as spooky technology. We all know (right?) about the scam emails that inform you of a surprise inheritance or lottery win. Recently I came across a surprising variation: a scam that deliberately targets folks who …
Man, I love Bruce Schneier. Here’s a pithy, pitch-perfect summary of your relationship with Facebook:
Social networking websites are “deliberately killing privacy” in order to make a profit, according to renowned security author Bruce Schneier.
Speaking at the RSA Europe security conference in London on Tuesday, the BT Counterpane
…
In an earlier post, I speculated that DropBox and TrueCrypt could be a killer combination — a painless way to keep confidential files encrypted while taking advantage of online backup and synchronization. I’ve been trying this out for a while now, and these two free tools work very well together. You’ll need an hour or two to set up the …
The Wall Street Journal, which has been doing great work on Internet privacy, has a disturbing piece today on the way online data companies build “profiles” of your intimate life — even if you try to stop them by deleting browser cookies. The disclosures are not entirely new — Wired, for example, has done good reporting on it before — …
By now you’ve heard endless warnings about the risk of short, trivial passwords. There’s a good chance you ignore them. Let’s talk about why that is and what you can do about it.
To begin with, it really does matter. Easy to guess passwords (12345, pet’s name, kid’s name, birthdate, etc) really do expose you to snooping and identity …