Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

CyberSecurity

Computer Security, CyberSecurity or Information Technology Security (IT Security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. CyberSecurity also refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.


icons and names of IoT sensor types, illustration - Credit: Metamorworks
Articles / CyberSecurity

Standards to Secure the Sensors That Power IoT

Yet as IoT adoption increases, IoT sensors and devices also are becoming more popular targets for cybercriminals.

Standards to Secure the Sensors That Power IoT Read More
refrigerator-freezer in a home appliance store - Credit: Alicia Kubista / Andrij Borys Associates
Articles / CyberSecurity

Security by Labeling

Consumer cybersecurity can no longer be ignored.

Security by Labeling Read More
colored umbrellas in flight - Credit: Tewan Banditrakkanka
Articles / CyberSecurity

A Turning Point for Cyber Insurance

Going forward cyber-insurance providers will thrive by succeeding in: rewarding security; generating knowledge; and punishing insecurity.

A Turning Point for Cyber Insurance Read More
The publication cover of the CISA Strat Plan
Articles / CyberSecurity

CISA Cybersecurity Strategic Plan

The Cybersecurity and Infrastructure Security Agency’s (CISA) 2023-2025 Strategic Plan is the agency’s first, comprehensive strategic plan since CISA was established in 2018. This is a major milestone for the agency.

CISA Cybersecurity Strategic Plan Read More
Logo - Cybersecurity and Infrastructure Security Agency
CyberSecurity / News & Information

CISA Develops Factsheet for Free Tools for Cloud Environments

CISA has developed and published a factsheet, Free Tools for Cloud Environments, to help businesses transitioning into a cloud environment identify proper tools and techniques necessary for the protection of critical assets and data security.

CISA Develops Factsheet for Free Tools for Cloud Environments Read More
Book Cover - The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
CyberSecurity / Books, Reports, Films & Images

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

Why do nations break into one another’s most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn’t the full story.

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations Read More
honey and honey stick - Credit: Slawomir Zelasko
Articles / CyberSecurity

Lamboozling Attackers: A New Generation of Deception

Imagine a world in which developers and operators of systems exploit attackers as much as attackers exploit defenders. By leveraging system-design knowledge and modern computing to deploy deception environments, software engineering teams can successfully bamboozle attackers for fun and profit while deepening systems resilience.

Lamboozling Attackers: A New Generation of Deception Read More
Singular green pin surrounded by many orange pins on a light orange backdrop. - Photograph: MirageC/Getty Images
Articles / CyberSecurity

How to Make Sure You’re Not Accidentally Sharing Your Location

Keep your movements private.

How to Make Sure You’re Not Accidentally Sharing Your Location Read More
Selman Design
Articles / CyberSecurity

The secret police: Cops built a shadowy surveillance machine in Minnesota after George Floyd’s murder

An investigation by MIT Technology Review reveals a sprawling, technologically sophisticated system in Minnesota designed for closely monitoring protesters.

The secret police: Cops built a shadowy surveillance machine in Minnesota after George Floyd’s murder Read More
Illustration: Tameem Sankari
Articles / CyberSecurity

The Untold Story of the Boldest Supply-Chain Hack Ever

The attackers were in thousands of corporate and government networks. They might still be there now. Behind the scenes of the SolarWinds investigation.

The Untold Story of the Boldest Supply-Chain Hack Ever Read More
The SolarWinds Corp. logo is seen on a sign at the headquarters - Photograph: SUZANNE CORDEIRO/Getty Images
Articles / CyberSecurity

The DOJ Detected the SolarWinds Hack 6 Months Earlier Than First Disclosed

In May 2020, the US Department of Justice noticed Russian hackers in its network but did not realize the significance of what it had found for six months.

The DOJ Detected the SolarWinds Hack 6 Months Earlier Than First Disclosed Read More
closeup of a hand holding the handset of an old red telephone - Photograph: Juan Moyano/Getty Images
Articles / CyberSecurity

The Bold Plan to Create Cyber 311 Hotlines

UT-Austin will join a growing movement to launch cybersecurity clinics for cities and small businesses that often fall through the cracks.

The Bold Plan to Create Cyber 311 Hotlines Read More
One unlocked orange padlock surrounded by locked green padlocks - Photograph: MirageC/Getty Images
Articles / CyberSecurity

Google Is Rolling Out Password-Killing Tech to All Accounts

The tech industry’s transition to passkeys gets its first massive boost with the launch of the alternative login scheme for Google’s billions of users.

Google Is Rolling Out Password-Killing Tech to All Accounts Read More
Closeup of a person's hand holding an Apple AirTag - Photograph: Melina Mara/Getty Images
Articles / CyberSecurity

Are You Being Tracked by an AirTag? Here’s How to Check

If you’re worried that one of Apple’s trackers is following you without consent, try these tips.

Are You Being Tracked by an AirTag? Here’s How to Check Read More
Car - Image: DiMaggio/Kalish
Articles / CyberSecurity

New Tool Shows if Your Car Might Be Tracking You, Selling Your Data

The free tool from Privacy4Cars provides some insight on whether your vehicle is collecting and sharing location and other types of data.

New Tool Shows if Your Car Might Be Tracking You, Selling Your Data Read More
Isolated black snake on red backdrop - Photograph: EduardHarkonen/Getty Images
Articles / CyberSecurity

The Underground History of Russia’s Most Ingenious Hacker Group

From USB worms to satellite-based hacking, Russia’s FSB hackers known as Turla have spent 25 years distinguishing themselves as “adversary number one.”

The Underground History of Russia’s Most Ingenious Hacker Group Read More
Stairs leading up to an open door in a wall with yellow glowing digital binary code - Illustration: BeeBright/Getty Images
Articles / CyberSecurity

Millions of PC Motherboards Were Sold With a Firmware Backdoor

Hidden code in hundreds of models of Gigabyte motherboards invisibly and insecurely downloads programs—a feature ripe for abuse, researchers say.

Millions of PC Motherboards Were Sold With a Firmware Backdoor Read More
pop-up alert stating 'That's totally not a virus, Don't tell your sysadmin' - Credit: Local_Doctor / Shutterstock
Articles / CyberSecurity

Hidden Malware Ratchets Up Cybersecurity Risks

What if cybercriminals could hide pernicious payloads in places where commercial cybersecurity software were unable to detect it? Unfortunately, this approach is both possible and increasingly viable.

Hidden Malware Ratchets Up Cybersecurity Risks Read More
Book Cover - A Hacker's Mind How the Powerful Bend Society's Rules, and How to Bend them Back
Books, Reports, Films & Images / CyberSecurity

A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back

It’s not just computers―hacking is everywhere.

A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back Read More
Book Cover - The Ransomware Hunting Team A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
CyberSecurity / Books, Reports, Films & Images

The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime

A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time.

The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime Read More

Posts navigation

1 2 … 12 Next

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • Can Generative AI Bots Be Trusted?
  • Computer Science Education Week 2023
  • Conjoined Twins: Artificial Intelligence and the Invention of Computer Science
  • Using Algorithms to Deliver Disaster Aid
  • DeepMind AI accurately forecasts weather — on a desktop computer
  • The U.S. v. Google: The Case That Will Determine the Future of Tech
  • Standards to Secure the Sensors That Power IoT
  • Making Connections
  • Let Us Not Put All Our Eggs in One Basket
  • Security by Labeling

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

• Dictionaries, Glossaries and Other Resources
• Glossary of Terms (Tag Terms)
• Links

Categories (Number of Articles in each)

  • — Broad Topics (670)
    • Climate (24)
    • Computing & Technology (337)
    • CyberSecurity (236)
    • Web Resources (39)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (39)
      • – WSU Resources (9)
    • Street Art (3)
  • — Form Types (653)
    • Articles (559)
    • Books, Reports, Films & Images (67)
    • News & Information (30)
    • Organizations (4)
  • — General (1)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (58)
  • Artificial Intelligence Research (7)
  • Avalanche Awesomeness (5)
  • Avalanche Control & Mitigation (5)
  • Avalanche Education (8)
  • Avalanche Photos (5)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (11)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (7)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (7)
  • Computer Crimes (5)
  • Computer Science Education (13)
  • Computer Security (17)
  • Coronavirus-Covid19 (15)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (11)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (11)
  • Ethics (32)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (7)
  • Geopolitics (9)
  • Google (Firm) (8)
  • Government Policy (12)
  • Government Regulation (12)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (31)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (23)
  • History – Internet (16)
  • History – Silicon Valley (8)
  • How To (10)
  • HTML (6)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (7)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (15)
  • Law & Policy (6)
  • Machine Learning (13)
  • Malware (10)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (6)
  • Passwords (8)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (10)
  • Privacy & Personal Information (12)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (8)
  • Resources (6)
  • Russia (42)
  • Security (9)
  • Security Guidance (8)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (27)
  • SolarWinds (5)
  • Spyware (8)
  • Supply Chain Attack (5)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (6)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (8)
  • Trustworthy Systems (5)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Forecasting (5)
  • Weather Phenomena (6)
  • Web Accessibility (6)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

December 4-10, 2023 is Computer Science Education Week

Logo - CSEdWeek

Featured Books

Book Cover - The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations"
Book Cover - The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime"
Book Cover - A Hacker's Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back"
Book Cover - A Biography of the Pixel"
Book Cover - Steve Jobs"
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News"
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives"
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution"
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage"
Book Cover - A New History of Modern Computing: How the computer became universal"
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon"
Book Cover - Hackers: Heroes of the Computer Revolution"
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton"
Book Cover - We Have Root: Even More Advice from Schneier on Security"
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed."
Book Cover - Facebook: The Inside Story by Steven Levy"
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State"
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics"
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age"
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power"
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order"
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers"
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America"
Book Cover- Permanent Record"
Book Cover - The Perfect Weapon"
Book Cover - Dawn of the Code War"
Book Cover - Zucked"
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier"
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier"
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier"
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier"
Copyright © 2020-2023 Wallace Web Design, LLC