Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

CyberSecurity

Computer Security, CyberSecurity or Information Technology Security (IT Security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. CyberSecurity also refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.

 


closeup of a hand holding the handset of an old red telephone - Photograph: Juan Moyano/Getty Images
Articles / CyberSecurity

The Bold Plan to Create Cyber 311 Hotlines

UT-Austin will join a growing movement to launch cybersecurity clinics for cities and small businesses that often fall through the cracks.

The Bold Plan to Create Cyber 311 Hotlines Read More
One unlocked orange padlock surrounded by locked green padlocks - Photograph: MirageC/Getty Images
Articles / CyberSecurity

Google Is Rolling Out Password-Killing Tech to All Accounts

The tech industry’s transition to passkeys gets its first massive boost with the launch of the alternative login scheme for Google’s billions of users.

Google Is Rolling Out Password-Killing Tech to All Accounts Read More
Closeup of a person's hand holding an Apple AirTag - Photograph: Melina Mara/Getty Images
Articles / CyberSecurity

Are You Being Tracked by an AirTag? Here’s How to Check

If you’re worried that one of Apple’s trackers is following you without consent, try these tips.

Are You Being Tracked by an AirTag? Here’s How to Check Read More
Car - Image: DiMaggio/Kalish
Articles / CyberSecurity

New Tool Shows if Your Car Might Be Tracking You, Selling Your Data

The free tool from Privacy4Cars provides some insight on whether your vehicle is collecting and sharing location and other types of data.

New Tool Shows if Your Car Might Be Tracking You, Selling Your Data Read More
Isolated black snake on red backdrop - Photograph: EduardHarkonen/Getty Images
Articles / CyberSecurity

The Underground History of Russia’s Most Ingenious Hacker Group

From USB worms to satellite-based hacking, Russia’s FSB hackers known as Turla have spent 25 years distinguishing themselves as “adversary number one.”

The Underground History of Russia’s Most Ingenious Hacker Group Read More
Stairs leading up to an open door in a wall with yellow glowing digital binary code - Illustration: BeeBright/Getty Images
Articles / CyberSecurity

Millions of PC Motherboards Were Sold With a Firmware Backdoor

Hidden code in hundreds of models of Gigabyte motherboards invisibly and insecurely downloads programs—a feature ripe for abuse, researchers say.

Millions of PC Motherboards Were Sold With a Firmware Backdoor Read More
pop-up alert stating 'That's totally not a virus, Don't tell your sysadmin' - Credit: Local_Doctor / Shutterstock
Articles / CyberSecurity

Hidden Malware Ratchets Up Cybersecurity Risks

What if cybercriminals could hide pernicious payloads in places where commercial cybersecurity software were unable to detect it? Unfortunately, this approach is both possible and increasingly viable.

Hidden Malware Ratchets Up Cybersecurity Risks Read More
Book Cover - A Hacker's Mind How the Powerful Bend Society's Rules, and How to Bend them Back
CyberSecurity / Books, Reports, Films & Images

A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back

It’s not just computers―hacking is everywhere.

A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back Read More
Book Cover - The Ransomware Hunting Team A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
CyberSecurity / Books, Reports, Films & Images

The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime

A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time.

The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime Read More
numeric codes and shining lights, illustration - Credit: Carlos Castilla
Articles / CyberSecurity

Cybersecurity as Illuminator for the Future of Computing Research

Security is still viewed by much of the computing research community in a narrow technical context, leading to results poorly aligned with motivating real-world needs.

Cybersecurity as Illuminator for the Future of Computing Research Read More
A viewfinder points at the Google logo. - Illustration: Elena Lacey
Articles / CyberSecurity

Europe’s Move Against Google Analytics Is Just the Beginning

Austria’s data regulator has found that the use of Google Analytics is a breach of GDPR. In the absence of a new EU-US data deal, other countries may follow.

Europe’s Move Against Google Analytics Is Just the Beginning Read More
What is GDPR The summary guide to GDPR compliance in the UK - iStock / art-sonik
Articles / CyberSecurity

What is GDPR? The summary guide to GDPR compliance in the UK

General Data Protection Regulation, or GDPR, have overhauled how businesses process and handle data. Our need-to-know GDPR guide explains what the changes mean for you

What is GDPR? The summary guide to GDPR compliance in the UK Read More
person resting on bed with mobile phone - Photograph: Carol Yepes/Getty Images
Articles / CyberSecurity

6 Ways to Delete Yourself From the Internet

You’ll never be able to get a clean slate—but you can significantly downsize your digital footprint.

6 Ways to Delete Yourself From the Internet Read More
Underwater fiber optic internet cable lying on the ocean floor. - Photograph: imaginima/Getty Images
Articles / CyberSecurity

The Most Vulnerable Place on the Internet

Underwater cables keep the internet online. When they congregate in one place, things get tricky.

The Most Vulnerable Place on the Internet Read More
CTRL ALT DEL—Rebooting the Role of Technology in Geo-Politics
Articles / CyberSecurity

The Future of Tech Is Here. Congress Isn’t Ready for It

In a conversation with WIRED, former representative Will Hurd talked AI, the metaverse, China, and how ill-prepared legislators are to grapple with any of it.

The Future of Tech Is Here. Congress Isn’t Ready for It Read More
Photo illustration by Cristiana Couceiro
Articles / CyberSecurity

The Battle for the World’s Most Powerful Cyberweapon

A Times investigation reveals how Israel reaped diplomatic gains around the world from NSO’s Pegasus spyware — a tool America itself purchased but is now trying to ban.

The Battle for the World’s Most Powerful Cyberweapon Read More
Image: Daniel Zender
Articles / CyberSecurity

Fraud Is Flourishing on Zelle. The Banks Say It’s Not Their Problem.

Zelle, the payments platform used by millions of customers, is a popular target of scammers. But banks have been reluctant to make fraud victims whole — despite owning the system.

Fraud Is Flourishing on Zelle. The Banks Say It’s Not Their Problem. Read More
North Korea on a map glitches with a 404 error code. - Illustration: Elena Lacey; Getty Images
Articles / CyberSecurity

North Korea Hacked Him. So He Took Down Its Internet

Disappointed with the lack of US response to the Hermit Kingdom’s attacks against US security researchers, one hacker took matters into his own hands.

North Korea Hacked Him. So He Took Down Its Internet Read More
This image may contain James Clapper Tie Accessories Accessory Human Person and Text
Articles / CyberSecurity

America’s Top Spy Talks Snowden Leaks and Our Ominous Future

America’s top spy and the future of surveillance.

America’s Top Spy Talks Snowden Leaks and Our Ominous Future Read More
A satellite eyes the moon. - Illustration: Elena Lacey
Articles / CyberSecurity

The Feds Want These Teams to Hack a Satellite—From Home

Meet the hackers who, this weekend, will try to commandeer an actual orbiter as part of a Defcon contest hosted by the Air Force and the Defense Digital Service.

The Feds Want These Teams to Hack a Satellite—From Home Read More

Posts navigation

1 2 … 12 Next

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • The Bold Plan to Create Cyber 311 Hotlines
  • The Underground History of Russia’s Most Ingenious Hacker Group
  • New Tool Shows if Your Car Might Be Tracking You, Selling Your Data
  • Are You Being Tracked by an AirTag? Here’s How to Check
  • Google Is Rolling Out Password-Killing Tech to All Accounts
  • Millions of PC Motherboards Were Sold With a Firmware Backdoor
  • Hidden Malware Ratchets Up Cybersecurity Risks
  • Spring Avalanche Conditions in Utah
  • These underwater cables can improve tsunami detection
  • Avalanches in Big & Little Cottonwood Canyon Early April 2023

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

•    Dictionaries, Glossaries and Other Resources
•    Glossary of Terms (Tag Terms)
•    Links

Categories (Number of Articles in each)

  • — Broad Topics (622)
    • Climate (19)
    • Computing & Technology (306)
    • CyberSecurity (225)
    • Web Resources (38)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (38)
      • – WSU Resources (9)
    • Street Art (3)
  • — Form Types (606)
    • Articles (514)
    • Books, Reports, Films & Images (65)
    • News & Information (29)
    • Organizations (4)
  • — General (1)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (51)
  • Artificial Intelligence Research (6)
  • Avalanche Awesomeness (5)
  • Avalanche Control & Mitigation (5)
  • Avalanche Education (8)
  • Avalanche Photos (5)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (11)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (5)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (6)
  • Computer Crimes (5)
  • Computer Science Education (10)
  • Computer Security (17)
  • Coronavirus-Covid19 (14)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (10)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (11)
  • Ethics (30)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (7)
  • Geopolitics (9)
  • Google (Firm) (7)
  • Government Policy (11)
  • Government Regulation (11)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (31)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (20)
  • History – Internet (15)
  • History – Silicon Valley (8)
  • How To (9)
  • HTML (5)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (15)
  • Law & Policy (6)
  • Machine Learning (12)
  • Malware (10)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (5)
  • Passwords (8)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (8)
  • Privacy & Personal Information (10)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (8)
  • Resources (6)
  • Russia (42)
  • Security (9)
  • Security Guidance (7)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (25)
  • Spyware (8)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (5)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (7)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Phenomena (6)
  • Web Accessibility (5)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi  is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

Featured Books

Book Cover - The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime
Book Cover - A Hacker's Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back
Book Cover - A Biography of the Pixel
Book Cover - Steve Jobs
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
Book Cover - A New History of Modern Computing: How the computer became universal
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book Cover - Hackers: Heroes of the Computer Revolution
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton
Book Cover - We Have Root: Even More Advice from Schneier on Security
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.
Book Cover - Facebook: The Inside Story by Steven Levy
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America
Book Cover- Permanent Record
Book Cover - The Perfect Weapon
Book Cover - Dawn of the Code War
Book Cover - Zucked
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier
Copyright © 2020-2023 Wallace Web Design, LLC
Scroll to Top