Archive | Uncategorized RSS feed for this section

Multi-word passphrases not all that secure, says Cambridge University

Posted March 19, 2012 Think a passphrase of multiple, random dictionary words is as unguessable as long strings of gibberish, but easier to remember? Not necessarily, according to a recent study. Read the story on Naked Security.

Leave a comment Continue Reading →

US Army warns about the risks of geotagging

Posted  March 14, 2012 The security risk of geotagging is obvious for soldiers: Every time your smartphone uploads a photo to Facebook, it includes exact latitude and longitude. The same goes for anybody: Geotagging on Timeline, Foursquare et al. presents a Dummies Guide to Stalking. Here’s the story on Naked Security.   

Leave a comment Continue Reading →

The Eminently Ignorable Document Retention Policy

Posted 03-02-12 Most businesses (93%!!!) have retention policies that dictate when and how to burn shit up. (Burn/delete/pulverize/whatever-ize.) Most businesses TOTALLY IGNORE THOSE POLICIES!! We made a nifty infographic to show how blasé we are about these matters. Check out the infographic on HPIO, then read the HPIO story about how to actually, you know, […]

Leave a comment Continue Reading →

How to Travel Unmolested by Warrantless Seizures and Creeping Malware

Posted March 8, 2012 Travel to the US can be a nightmare; “Homeland Security” has free rein to take your laptop or mobile phone. Travel to China is a good way to bring spyware and malware back home. Here are some helpful tips to make air travel smooth and free of frustrating security snags. Read […]

Leave a comment Continue Reading →

Google offers $1 million in exploit rewards for Chrome hacks

Posted  February 28, 2012 Google is offering cash prizes totaling $1 million to hackers, plus a Chromebook, for those who successfully exploit its Chrome browser at the CanSecWest security conference next week. Read all about it on Naked Security. 

Leave a comment Continue Reading →

Activists creating decentralized mesh networks that can’t be blocked, filtered or silenced

Posted February 24, 2012 Imagine an Internet beyond the reach of censorship and surveillance. Imagine an Internet that couldn’t be shut down when a repressive government such as Egypt’s snaps its fingers at its ISP lackeys. Perhaps it’s beyond the reach of mass adoption, but the groundwork’s being laid. Read the full story in March’s […]

Leave a comment Continue Reading →

What to Do When an Employee Cries (Legal) Wolf

There are nightmare employees who threaten legal action on flimsy grounds, including charges of racial, gender, or disability discrimination. How do you defend your company? Conversely, are you sure they’re not right? Read the feature story on HP Input/Output. 

Leave a comment Continue Reading →

MegaUpload data could be deleted by Thursday

Posted January 31, 2012 According to reports, hosting companies may start deleting MegaUpload users’ content from their servers as soon as Thursday – regardless of whether or not the content is legal. Read the story.

Leave a comment Continue Reading →

How to stay safe when traveling for the holidays

Posted: December 14, 2011 Whether you approach the holiday travel season with dread or excitement, chances are you’ll be carrying one or more mobile devices and looking for those last minute-travel bargains. Read my Naked Security post to learn what to watch out for this year.

Leave a comment Continue Reading →

WikiLeaks delays more secure whistleblower system

WikiLeaks has indefinitely delayed the release of a new system for whistleblowers to remain anonymous while submitting tips. Read the full story.

Leave a comment Continue Reading →