Updated: 2013-01-28 17:33:04
A Guest Post by Robin Wilton of the Internet Society We are the raw material of the new economy. Data about all of us is being prospected for, mined, refined, and traded… . . . and most of us don’t even know about it. Every time we go online, we add to [...]
Updated: 2013-01-22 22:31:42
Welcome to first podcast of 2013. In honor of Data Privacy Day, which falls on January 28th, I’ll be discussing current data privacy and security issues facing both consumers and businesses by taking you through the pros and cons of privacy legislation, privacy in the context of social media, and corporate data security at the [...]
Updated: 2013-01-21 18:31:28
The latest Java exploit has given another view into the workings of the cybercrime economy. Although I should not be, I am always startled at just how open and robustly capitalistic the whole enterprise has become. The business is conducted more or less in the open. Krebs on Security has a nice piece on an [...]
Updated: 2013-01-18 20:55:04
I did not post on the recent Java vulnerability because the fixes came out so quickly, however, it looks like I relaxed too soon. Apparently there was a second vulnerability that did not get fixed. At this point, you should probably just disable Java in your browser. Gizmodo has a short article on how to [...]
Updated: 2013-01-14 18:04:05
Gigaom reports on a major security issue at Nokia, first announced in the “Treasure Hunt” blog. Their Asha and Lumia phones come with something they call the “Xpress Browser”. To improve the browser experience, the web traffic is proxies and cached. That is a fairly common and accepted practice. Where Nokia has stepped into questionable [...]
Updated: 2012-12-24 20:25:08
Welcome to the December podcast – our last official podcast of 2012. In this episode, I’ll be running down some of the biggest online privacy and security events of the last year. From the Zappos and LinkedIn password breaches, to the epic hacking of reporter Mat Honan, I’ll be providing user tips and suggestions to [...]
Updated: 2012-12-12 21:56:26
spider.io is talking about a bug they discovered in Microsoft Internet Explorer versions 6-10. Evidently the bug allows tracking of your mouse movement even if the browser window has been minimized and you have a different application active. They say that at least two companies providing display ad analytics are already using this exploit to improve [...]
Updated: 2012-12-11 16:33:33
Numberphile recently posted a video about the math behind RSA encryption. In the video below, a brief description of public key cryptography is given and then we are shown a simple example of the math used to perform encryption and decryption (math example @ 2:25). In the video, James skips over the method for determining [...]