Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

CyberSecurity

Computer Security, CyberSecurity or Information Technology Security (IT Security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. CyberSecurity also refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.


A viewfinder points at the Google logo. - Illustration: Elena Lacey
Articles / CyberSecurity

Europe’s Move Against Google Analytics Is Just the Beginning

Austria’s data regulator has found that the use of Google Analytics is a breach of GDPR. In the absence of a new EU-US data deal, other countries may follow.

Europe’s Move Against Google Analytics Is Just the Beginning Read More
What is GDPR The summary guide to GDPR compliance in the UK - iStock / art-sonik
Articles / CyberSecurity

What is GDPR? The summary guide to GDPR compliance in the UK

General Data Protection Regulation, or GDPR, have overhauled how businesses process and handle data. Our need-to-know GDPR guide explains what the changes mean for you

What is GDPR? The summary guide to GDPR compliance in the UK Read More
CTRL ALT DEL—Rebooting the Role of Technology in Geo-Politics
Articles / CyberSecurity

The Future of Tech Is Here. Congress Isn’t Ready for It

In a conversation with WIRED, former representative Will Hurd talked AI, the metaverse, China, and how ill-prepared legislators are to grapple with any of it.

The Future of Tech Is Here. Congress Isn’t Ready for It Read More
person resting on bed with mobile phone - Photograph: Carol Yepes/Getty Images
Articles / CyberSecurity

6 Ways to Delete Yourself From the Internet

You’ll never be able to get a clean slate—but you can significantly downsize your digital footprint.

6 Ways to Delete Yourself From the Internet Read More
Underwater fiber optic internet cable lying on the ocean floor. - Photograph: imaginima/Getty Images
Articles / CyberSecurity

The Most Vulnerable Place on the Internet

Underwater cables keep the internet online. When they congregate in one place, things get tricky.

The Most Vulnerable Place on the Internet Read More
Photo illustration by Cristiana Couceiro
Articles / CyberSecurity

The Battle for the World’s Most Powerful Cyberweapon

A Times investigation reveals how Israel reaped diplomatic gains around the world from NSO’s Pegasus spyware — a tool America itself purchased but is now trying to ban.

The Battle for the World’s Most Powerful Cyberweapon Read More
Image: Daniel Zender
Articles / CyberSecurity

Fraud Is Flourishing on Zelle. The Banks Say It’s Not Their Problem.

Zelle, the payments platform used by millions of customers, is a popular target of scammers. But banks have been reluctant to make fraud victims whole — despite owning the system.

Fraud Is Flourishing on Zelle. The Banks Say It’s Not Their Problem. Read More
North Korea on a map glitches with a 404 error code. - Illustration: Elena Lacey; Getty Images
Articles / CyberSecurity

North Korea Hacked Him. So He Took Down Its Internet

Disappointed with the lack of US response to the Hermit Kingdom’s attacks against US security researchers, one hacker took matters into his own hands.

North Korea Hacked Him. So He Took Down Its Internet Read More
This image may contain James Clapper Tie Accessories Accessory Human Person and Text
Articles / CyberSecurity

America’s Top Spy Talks Snowden Leaks and Our Ominous Future

America’s top spy and the future of surveillance.

America’s Top Spy Talks Snowden Leaks and Our Ominous Future Read More
A satellite eyes the moon. - Illustration: Elena Lacey
Articles / CyberSecurity

The Feds Want These Teams to Hack a Satellite—From Home

Meet the hackers who, this weekend, will try to commandeer an actual orbiter as part of a Defcon contest hosted by the Air Force and the Defense Digital Service.

The Feds Want These Teams to Hack a Satellite—From Home Read More
An illustration showing the outline of a person walking, with various parts of their body "tracked" by Amazon devices - Tyler Comrie / The Atlantic
Articles / CyberSecurity

The Rise of ‘Luxury Surveillance’

Surveillance isn’t just imposed on people: Many of us buy into it willingly.

The Rise of ‘Luxury Surveillance’ Read More
August Pfluger - Photograph: Bill Clark/Getty Images
Articles / CyberSecurity

Autonomous Vehicles Join the List of US National Security Threats

Lawmakers are growing concerned about a flood of data-hungry cars from China taking over American streets.

Autonomous Vehicles Join the List of US National Security Threats Read More
Thin red metal wires surrounding a black hole in the center eye concept - Photograph: Sven Hagolani/Getty Images
Articles / CyberSecurity

Spyware Scandals Are Ripping Through Europe

The latest crisis that rocked the Greek government shows the bloc’s surveillance problem goes beyond the notorious NSO Group.

Spyware Scandals Are Ripping Through Europe Read More
a ball peeking out from the corner - Photograph: Serg Myshkovsky/Getty Images
Articles / CyberSecurity

Open Source Intelligence May Be Changing Old-School War

Intelligence collected from public information online could be impacting traditional warfare and altering the calculus between large and small powers.

Open Source Intelligence May Be Changing Old-School War Read More
Image credit: Ariel Davis
Articles / CyberSecurity

The hacker-for-hire industry is now too big to fail

This is a big moment of turbulence and change for the hacking business. But the demand is here to stay.

The hacker-for-hire industry is now too big to fail Read More
October is Cybersecurity Awareness Month
CyberSecurity / News & Information

About Cybersecurity Awareness Month

Cybersecurity Awareness Month – observed every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online.

About Cybersecurity Awareness Month Read More
colorful shapes visible in keyhole
Articles / CyberSecurity

The Long Road Ahead to Transition to Post-Quantum Cryptography

Much of the post-quantum transition work that needs to be done can start now, even while we wait for algorithm and protocol standards to be updated.

The Long Road Ahead to Transition to Post-Quantum Cryptography Read More
image of a lock over hands on a keyboard - Credit: Shutterstock
Articles / CyberSecurity

Even If Users Do Not Read Security Directives, Their Behavior Is Not So Catastrophic

When we eventually started to analyze the obtained data after the third survey round, we discovered surprising results that led to heated discussions among the research team members.

Even If Users Do Not Read Security Directives, Their Behavior Is Not So Catastrophic Read More
diptych illustration with a line drawing with organic shapes on the left and sand dune eye and galaxy on the right - Illustration: Mark Pernice
Articles / CyberSecurity

Dune Foresaw—and Influenced—Half a Century of Global Conflict

From Afghanistan to cyberattacks, Frank Herbert’s novel anticipated and shaped warfare as we know it.

Dune Foresaw—and Influenced—Half a Century of Global Conflict Read More
binoculars - Credit: DestroLove
Articles / CyberSecurity

Cyber Reconnaissance Techniques

The evolution of and countermeasures for existing reconnaissance techniques.

Cyber Reconnaissance Techniques Read More

Posts navigation

1 2 … 11 Next

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • Raising Robovoices
  • Modern Tech Can’t Shield Your Secret Identity
  • A Call to Action
  • The Troubling Future for Facial Recognition Software
  • Winter Storm Elliott – December, 2022
  • Technology’s Impact on Morality
  • Trust, Regulation, and Human-in-the-Loop AI: within the European region
  • How Facebook and Google fund global misinformation
  • This 22-Year-Old Builds Chips in His Parents’ Garage
  • What is GDPR? The summary guide to GDPR compliance in the UK

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

• Dictionaries, Glossaries and Other Resources
• Glossary of Terms (Tag Terms)
• Links

Categories (Number of Articles in each)

  • — Broad Topics (604)
    • Climate (19)
    • Computing & Technology (300)
    • CyberSecurity (215)
    • Web Resources (38)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (36)
      • – WSU Resources (8)
    • Street Art (3)
  • — Form Types (588)
    • Articles (499)
    • Books, Reports, Films & Images (62)
    • News & Information (29)
    • Organizations (4)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (50)
  • Artificial Intelligence Research (6)
  • Avalanche Education (7)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (8)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (5)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (6)
  • Computer Crimes (5)
  • Computer Security (17)
  • Computing Education (9)
  • Coronavirus-Covid19 (14)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (10)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (5)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (10)
  • Ethics (28)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (6)
  • Geopolitics (9)
  • Google (Firm) (7)
  • Government Policy (11)
  • Government Regulation (11)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (29)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (18)
  • History – Internet (15)
  • History – Silicon Valley (8)
  • How To (9)
  • HTML (5)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (14)
  • Law & Policy (6)
  • Machine Learning (11)
  • Malware (9)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (5)
  • Passwords (7)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (8)
  • Privacy & Personal Information (10)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (7)
  • Resources (5)
  • Russia (41)
  • Security (9)
  • Security Guidance (7)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (25)
  • Spyware (8)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (5)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (7)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Phenomena (6)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-22 Wallace Web Design, LLC

 

January 22-28, 2023 is Data Privacy Week

Mum’s the word…

National Cybersecurity Alliance - Data Privacy Week Logo

Featured Books

Book Cover - A Biography of the Pixel
Book Cover - Steve Jobs
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
Book Cover - A New History of Modern Computing: How the computer became universal
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book Cover - Hackers: Heroes of the Computer Revolution
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton
Book Cover - We Have Root: Even More Advice from Schneier on Security
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.
Book Cover - Facebook: The Inside Story by Steven Levy
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America
Book Cover- Permanent Record
Book Cover - The Perfect Weapon
Book Cover - Dawn of the Code War
Book Cover - Zucked
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier
Copyright © 2020-2022 Wallace Web Design, LLC
Scroll to Top