Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Articles

Articles from sources such as magazines, newspapers & blogs.


battery stress testing - Winni Wintermeyer
Computing & Technology / Articles

Novel lithium-metal batteries will drive the switch to electric cars

A new type of battery could finally make electric cars as convenient and cheap as gas ones.

Novel lithium-metal batteries will drive the switch to electric cars Read More
F.G. Walton Smith at sea - NOAA
Climate / Articles

The Atlantic’s vital currents could collapse. Scientists are racing to understand the dangers.

So far, the efforts to observe the currents directly show they’re weirder and more unpredictable than expected.

The Atlantic’s vital currents could collapse. Scientists are racing to understand the dangers. Read More
researcher pulling robot mapping device from water - Photograph: Charlie Paull/MBARI
Climate / Articles

Underwater Permafrost Is a Big, Gassy Wild Card for the Climate

You’ve probably heard of permafrost, the frozen carbon-rich land. But it’s also thawing under the sea, burping up planet-warming gases.

Underwater Permafrost Is a Big, Gassy Wild Card for the Climate Read More
Silhouette of a person standing in front of the Kremlin's Spasskaya tower and St Basil's cathedral at sunset in Moscow.. - Photograph: Getty Images
Computing & Technology / Articles

Russia Is Facing a Tech Worker Exodus

With founders and developers scrambling for the exit, the Russian tech scene is taking a major hit.

Russia Is Facing a Tech Worker Exodus Read More
home routers stacked on top of each other - Photograph: Getty Images
Articles / CyberSecurity

Russia’s Sandworm Hackers Have Built a Botnet of Firewalls

Western intelligence services are raising alarms about Cyclops Blink, the latest tool at the notorious group’s disposal.

Russia’s Sandworm Hackers Have Built a Botnet of Firewalls Read More
KYIV, UKRAINE - People hold signs and chant slogans during a protest outside the Russian Embassy on February 22, 2022 in Kyiv in anticipation of an invasion from Russia. (Photo by Chris McGrath/Getty Images)
Articles / CyberSecurity

Second Wiper Attack Strikes Systems in Ukraine and Two Neighboring Countries

The wiper, dubbed HermeticWiper, struck a bank in Ukraine as well as machines in Latvia and Lithuania belonging to two contractors that work with the Ukrainian government.

Second Wiper Attack Strikes Systems in Ukraine and Two Neighboring Countries Read More
Photo of Brewster Kahle
Computing & Technology / Articles

After 25 years, Brewster Kahle and the Internet Archive are still working to democratize knowledge

Corporations continue to control access to materials that are in the library, which is controlling preservation, and it’s killing us.

After 25 years, Brewster Kahle and the Internet Archive are still working to democratize knowledge Read More
Illustration of Ukrainian flag made of code - Illustration by Nicholas Konrad / The New Yorker
Articles / CyberSecurity

The Threat of Russian Cyberattacks Looms Large

So far, the Russian invasion of Ukraine has not involved the sort of devastating cyberattacks that many anticipated. But it’s not clear why, or whether that pattern will hold.

The Threat of Russian Cyberattacks Looms Large Read More
Ukrainian troops. (Official photo by the Ministry of Defense of Ukraine)
Articles / CyberSecurity

Cyber Realism in a Time of War

“For all the talk about ‘cyber war’, today shows that when conflict escalates to this point it is secondary. If you want to take out infrastructure then missiles are more straightforward than using computer code. Cyber’s main role now is perhaps to sow confusion about events.”

Cyber Realism in a Time of War Read More
An illustration of a hacker wearing a Putin mask. - Illustration: WIRED; Getty Images
Articles / CyberSecurity

Leaked Ransomware Docs Show Conti Helping Putin From the Shadows

Members of the hacker gang may act in Russia’s interest, but their links to the FSB and Cozy Bear hackers appear ad hoc.

Leaked Ransomware Docs Show Conti Helping Putin From the Shadows Read More
a woman walking - Photograph: DIMITAR DILKOFF/Getty Images
Articles / CyberSecurity

The Russian Disinfo Operation You Never Heard About

The campaign known as Secondary Infektion appears to be a distinct effort from the meddling of the IRA and GRU—and it went undetected for years.

The Russian Disinfo Operation You Never Heard About Read More
Person working in Intel laboratory with computer equipment - Photograph: Shlomo Shoham
Articles / CyberSecurity

Inside the Lab Where Intel Tries to Hack Its Own Chips

Researchers at iSTARE have to think like the bad guys, finding critical flaws before processors go to production.

Inside the Lab Where Intel Tries to Hack Its Own Chips Read More
A collage with a demonstrator waving a Ukrainian flag. - Illustration: Elena Lacey; Getty Images
Articles / CyberSecurity

Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine

A wave of cyberattacks meant to make a statement and particularly buoy Ukraine could have unintended consequences.

Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine Read More
ANIMATION: XEMRIND
Computing & Technology / Articles

How Telegram Became the Anti-Facebook

Hundreds of millions of users. No algorithm. No ads. Courage in the face of autocracy. Sound like a dream? Careful what you wish for.

How Telegram Became the Anti-Facebook Read More
people watch Vladimir Putin's address - AP Photo/Denis Kaminev, File
Articles / Computing & Technology

Activists are using ads to sneak real news to Russians about Ukraine

From pop-up notifications to Facebook ads, campaigners in Ukraine and beyond are using any means necessary to beat Russia’s information firewall.

Activists are using ads to sneak real news to Russians about Ukraine Read More
Multicolored ethernet cables tangled into a ball against a black background - Photograph: Nikuwka/Getty Images
Computing & Technology / Articles

Why ICANN Won’t Revoke Russian Internet Domains

The organization says cutting the country off would have “devastating” effects on the global internet system.

Why ICANN Won’t Revoke Russian Internet Domains Read More
Cartoon padlock and broken glass superimposed on a Russian flag. - Cartoon padlock and broken glass superimposed on a Russian flag. Enlarge Sean Gladwell / Getty Images
Computing & Technology / Articles

Why Russia’s “disconnection” from the Internet isn’t amounting to much

So far, moves by two of the Internet’s major pipelines are having negligible effects.

Why Russia’s “disconnection” from the Internet isn’t amounting to much Read More
Russian serviceman operating a T72B3 tank of the Russian Southern Military District's 150th Rifle Division in a snowy field - Photograph: Erik Romanenko\Getty Images
Computing & Technology / Articles

Online Sleuths Are Using Face Recognition to ID Russian Soldiers

It takes five minutes to put a name to a soldier’s face using little more than a screenshot, but there’s a catch.

Online Sleuths Are Using Face Recognition to ID Russian Soldiers Read More
Collage of images of Putin proUkraine protesters Russian soldiers and cracked computer screen - Photo-Illustration: Sam Whitney; Getty Images
Articles / CyberSecurity

The Spectacular Collapse of Putin’s Disinformation Machinery

A few critical errors have brought down Russia’s complex and objectively brilliant war of influence in the West.

The Spectacular Collapse of Putin’s Disinformation Machinery Read More
Illustration of wifi symbol made of fortified metal - Illustration: Sam Whitney; Getty Images
Articles / CyberSecurity

How Ukraine’s Internet Can Fend Off Russian Attacks

The besieged country’s complex internet infrastructure has evolved to promote resiliency.

How Ukraine’s Internet Can Fend Off Russian Attacks Read More

Posts navigation

Previous 1 2 3 … 21 Next

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
  • The architect making friends with flooding
  • In the Plex: How Google Thinks, Works, and Shapes Our Lives
  • How Bellingcat is using TikTok to investigate the war in Ukraine
  • Science Is Not Another Opinion
  • Informing California Privacy Regulations with Evidence from Research
  • What To Do About Deepfakes
  • Hacking Russia was off-limits. The Ukraine war made it a free-for-all
  • The Pegasus Project
  • How Democracies Spy on Their Citizens

Reference

• Dictionaries, Glossaries and Other Resources
• Glossary of Terms (Tag Terms)
• Links

Categories (Number of Articles in each)

  • — Broad Topics (521)
    • Climate (12)
    • Computing & Technology (245)
    • CyberSecurity (193)
    • Web Resources (38)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (35)
      • – WSU Resources (8)
    • Street Art (3)
  • — Form Types (505)
    • Articles (420)
    • Books, Reports, Films & Images (59)
    • News & Information (27)
    • Organizations (4)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (39)
  • Artificial Intelligence Research (5)
  • Avalanche Education (7)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (8)
  • Bellingcat (6)
  • China (24)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (9)
  • Computer Chip Manufacture (5)
  • Computer Crimes (5)
  • Computer Security (17)
  • Computing Education (9)
  • Coronavirus-Covid19 (10)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (16)
  • CyberSecurity (10)
  • CyberSecurity News (5)
  • Cyber Warfare (15)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (10)
  • Ethics (22)
  • Ethics of AI (12)
  • Facebook (11)
  • Geopolitics (9)
  • Government Policy (10)
  • Government Regulation (8)
  • Guidance (17)
  • Hackers & Hacking (29)
  • Hacking for Hire (8)
  • Historical (8)
  • History – Computing (12)
  • History – Internet (13)
  • History – Silicon Valley (7)
  • How To (6)
  • HTML (5)
  • Human Psychology (5)
  • Internet – Government Policy (7)
  • Internet Access (5)
  • Internet Censorship (10)
  • Internet Connectivity (5)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (11)
  • Law & Policy (6)
  • Machine Learning (9)
  • Malware (9)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (14)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (11)
  • Open Source Intelligence (OSINT) (12)
  • Opinion & Perspective (5)
  • Passwords (7)
  • Pegasus (6)
  • Privacy (26)
  • Privacy & Data Protection (6)
  • Privacy & Personal Information (10)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (7)
  • Resources (5)
  • Russia (40)
  • Security (9)
  • Security Guidance (7)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (5)
  • Social Media (24)
  • Spyware (7)
  • Surveillance – Electronic (11)
  • Surveillance – Online (12)
  • Surveillance Capitalism (5)
  • Technological Achievement (8)
  • Technology & Society (7)
  • Technology Policy (6)
  • Ukraine (28)
  • Understanding Your World (6)
  • User eXperience (5)
  • Weather Phenomena (6)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (6)
  • Zero-Click / Interactionless Attacks (5)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-22 Wallace Web Design, LLC

 

Featured Books

Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
Book Cover - A New History of Modern Computing: How the computer became universal
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book Cover - Hackers: Heroes of the Computer Revolution
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton
Book Cover - We Have Root: Even More Advice from Schneier on Security
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.
Book Cover - Facebook: The Inside Story by Steven Levy
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America
Book Cover- Permanent Record
Book Cover - The Perfect Weapon
Book Cover - Dawn of the Code War
Book Cover - Zucked
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier
Copyright © 2020-2022 Wallace Web Design, LLC
Scroll to Top