Wikipedia Is the Last Best Place on the Internet
People used to think the crowdsourced encyclopedia represented all that was wrong with the web. Now it’s a beacon of so much that’s right.
Wikipedia Is the Last Best Place on the Internet Read MoreArticles from sources such as magazines, newspapers & blogs.
People used to think the crowdsourced encyclopedia represented all that was wrong with the web. Now it’s a beacon of so much that’s right.
Wikipedia Is the Last Best Place on the Internet Read MoreThe operator of the Wayback Machine allows Wikipedia’s users to check citations from books as well as the web.
The Internet Archive Is Making Wikipedia More Reliable Read MoreImmense changes show us, year after year, that we are basically the same as ever, just reacting to the curves of life well out of our control.
How Technology Explodes the Concept of ‘Generations’ Read MoreThe term we use for bad cryptography products is “snake oil,” which was the turn-of-the-century American term for quack medicine.
Bruce Schneier’s List of Snake Oil Warning Signs Read MoreThe NIST NICE National Cybersecurity Workforce Framework is a nationally focused resource that establishes a taxonomy and common lexicon to describe cybersecurity work, and workers, regardless of where, or for whom, the work is performed. The NICE Framework is intended to be applied in the public, private, and academic sectors.
National Initiative for Cybersecurity Education Cybersecurity Workforce Framework Read MoreA list of 100,000 passwords from Troy Hunt’s “Have I Been Pwned” data set. If you see a password that you use in this list you should change it immediately.
Passwords, passwords everywhere: How password blacklists can help your users to make sensible password choices Read More“Superintelligence” is a flawed concept and shouldn’t inform our policy decisions.
We Shouldn’t be Scared by ‘Superintelligent A.I.’ Read MoreResidents in the Tennessee Valley are cleaning up after a long-lived line of thunderstorms, known as a derecho, brought severe wind gusts on Sunday. The intense storms caused straight-line wind damage along a path that stretched for more than 600 miles.
A deadly derecho slammed Nashville with 70 mph winds Sunday, snapping trees and knocking out power Read MoreWe need to raise the awareness on a fundamental security technology [WPA2 Enterprise] that is very often deployed by violating its requirements, which creates important risks to users.
Enterprise Wi-Fi: We Need Devices That Are Secure by Default Read MoreDigital permanence not only considers data integrity, but also targets guarantees of relevance and accessibility.
Achieving Digital Permanence Read MoreIs the increasing use of encryption an impediment in the fight against crime or an essential tool in the defense of personal privacy, intellectual property, and computer security?
Encryption and Surveillance Read MoreThe technical resources largely exist to address the risk of a hyperconnected world, but the political, economic, and social impetus is lagging. “The fundamental problem is that companies are interested in getting products to market quickly. The market does not reward security,” Schneier says.
Deep Insecurities: The Internet of Things Shifts Technology Risk Read MoreProgress in [environmental protection, education, and global health research], however, is wholly dependent upon robust cybersecurity. Without a solid virtual foundation, the ability to move forward in any of these areas will always be held at risk.
The COVID Catalyst Read MoreHumanity is facing thorny problems on all fronts. These folks are working to solve them—and trying to avoid the unintended consequences this time.
WIRED25: Stories of People Who Are Racing to Save Us Read MoreMaking progress means making (sometimes devastating) mistakes. And then learning from them.
It’s Time to Push Tech Forward, and Rebuild What It Broke Read MoreSure, youth and innocence are great. But what if experience is even greater? We might get more innovation if we let the elders take the lead.
Who Are the Most Successful Entrepreneurs? The Middle-Aged Read MoreThe Firefox 70 Accessibility Inspector is an auditing facility to help identify and fix many common mistakes and practices to help improve site accessibility.
Auditing For Accessibility Problems With Firefox Developer Tools Read MoreFuzzing, or fuzz testing, is the process of finding security vulnerabilities in input-parsing code by repeatedly testing the parser with modified, or fuzzed, inputs. Fuzzing is commonly used as a shorthand for security testing because the vast majority of its applications is for finding security vulnerabilities.
Fuzzing: Hack, Art, and Science Read More“We’re not prepared for the end of Moore’s Law: It has fueled prosperity of the last 50 years. But the end is now in sight.” MIT Technology Review, February 24, 2020 Computing/Quantum computing By David Rotman “Finding successors to today’s …
We’re not prepared for the end of Moore’s Law Read MoreCredit card fraudsters can use these doppelgängers [detailed fake user profiles] to attempt to evade the machine-learning-based anomaly-detecting antifraud measures upon which banks and payments service providers have come to rely.
Dark Web’s Doppelgängers Aim to Dupe Antifraud Systems Read More