Here is a telltale sign how the big, powerful internet giants believe they can rule the world. In the US, software engineer Brandon Jackson who works for Microsoft arrived home in one evening only to discover that his Amazon Alexa … Read the story...
Author: Ari
Modern cars have become personal data collection machines
Since 2018, when the renowned cybersecurity expert Bruce Schneier tried (and failed) to buy a new car in the US that would come without internet connection, I have worried about the personal data automakers will be collecting from our … Read the story...
How I fought a copyright case against Copytrack
It was a letter from hell. When a small business or ordinary citizen gets a threatening letter from a law firm that accuses the receiver of a serious, multiyear image copyright breach, it is an experience that makes the receiver … Read the story...
How to use long and secure passwords without typing a single character
If you are not a big fan of long, unique passwords or perhaps are reluctant ever type passwords again, this is for you. I will show you a method that lets you do exactly what the cybersecurity experts have been … Read the story...
10 cornerstones for managing cyber security
I recently read a book titled Cyber Crisis that has a mission to convince every business manager and a person who owns a phone, computer, game console or an electronics device that cybersecurity is everyone’s business. The author Eric Cole, … Read the story...
Cybersecurity trends for small businesses and homes for 2023
While small organizations and home computer users continually learn more about cybersecurity, information technology develops as well. Managers can adopt the latest tools to protect important business data within organizations and family heads can protect sensitive personal data at homes. … Read the story...
Mobile devices you need for staying online on the road
Planning what to pack on a trip can be a tricky task, and if your work involves computers and connectivity, it complicates the task even more. The length of a trip, is it a work or leisure journey, the packing … Read the story...
The problem with privacy: ideas and real life behavior don’t match
Scientists have researched for years the mismatch of results originating from interviews and surveys, and the actual behavior of people. Something tends to be wrong with the results, although respondents feel they have given accurate answers. This phenomenon is surprisingly … Read the story...
What small businesses and homes can learn from the Twitter whistleblower
One of the last big decisions Jack Dorsey made before handing over Twitter’s CEO responsibilities to Parag Agrawal was to hire a cybersecurity expert to fix the numerous security problems the company has. Peiter “Mudge” Zatko accepted Dorsey’s offer, and … Read the story...
Have you misunderstood Linux?
Linux is an excellent piece of software, but what exactly is it? Your mobile phone may run Linux if it is powered by Android, the most powerful cloud servers on the internet are powered by Linux, your security camera may … Read the story...