How to Update All Your Gear (For Safety!)
Advice on how to stay safe with iOS, Android, MacOS, Windows, Your TV, and Routers.
How to Update All Your Gear (For Safety!) Read MoreThe form of post content such as an article or book.
Advice on how to stay safe with iOS, Android, MacOS, Windows, Your TV, and Routers.
How to Update All Your Gear (For Safety!) Read MoreBefore you go in search of that next sassy cat photo, pressing meme or joke about the Art of the Deal from OccDems make sure your OS is current.
Don’t let pirates slice-n-dice your iOS Device Read MoreThe “No More Ransom” website is an initiative by the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and McAfee with the goal to help victims of ransomware retrieve their encrypted data without having to pay the criminals.
No More Ransom Project Read MoreI am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998. I’m a Special Advisor to IBM Security, a fellow and lecturer at Harvard’s Kennedy School, and a board member of EFF. This personal website expresses the opinions of none of those organizations.
Schneier on Security – “Crypto-Gram” Newsletter Read MoreCyberScoop is the leading public sector media company reaching top cybersecurity leaders both online and in-person through breaking news, newsletters, events, radio and TV.
CyberScoop Read MoreThe latest news, opinion and research in security, from Communications of the ACM online.
Communications of the ACM – Security Read More‘New York Times’ reporter David Sanger says the world’s leading producer of telecom equipment, China’s Huawei, will be central to the spread of a global 5G network — which could pose a major threat to U.S. national security. “The 5G …
The 5G Network & The Possible Threat To Cybersecurity Read MoreThe SANS Institute was established in 1989 as a cooperative research and education organization.
SANS Webinars & Information Security Resources Read More“KrebsOnSecurity.com is a daily blog dedicated to investigative stories on cybercrime and computer security.”
Krebs on Security Read More“Most websites use JavaScript libraries, and many of them are known to be vulnerable. Understanding the scope of the problem, and the many unexpected ways that libraries are included, are only the first steps toward improving the situation. The goal here is that the information included in this article will help inform better tooling, development practices, and educational efforts for the community.”
Thou Shalt Not Depend on Me Read MoreThe Cyberlaw Podcast is a weekly interview series and discussion on the latest events in technology, security, privacy, and government. The podcast is hosted by Steptoe & Johnson LLP partner Stewart Baker, who is joined by a wide variety of guests including academics, politicians, authors, and reporters. You can subscribe to the podcast here. It is also available on iTunes, Google Play, Spotify and other podcast platforms.
CyberLaw Podcast Read MoreThe Lawfare Podcast is the weekly audio production of the Lawfare staff in cooperation with the Brookings Institution. Podcast episodes include interviews with policymakers, scholars, journalists, and analysts; events and panel discussions.
Lawfare Podcast Read MoreAs our lives become increasingly dependent upon computer systems and cyber technologies grow ever more sophisticated, the internet has emerged as the new battleground of the 21st century. From criminals’ stealing credit card and social security number information to foreign governments’ hacking into American companies’ information systems, cyber attacks can take on myriad forms, prompting the government to formulate new measures to protect online security. Since cyberwarfare knows no territorial bounds, ensuring cybersecurity will also require international cooperation and an updated understanding of jus ad bellum, as it applies to cyber attacks.
Lawfare Blog – Cybersecurity Read MoreDayZero dives deep in cybersecurity vulnerabilities, and the crime, espionage, and warfare taking place on networked computers. We look at legislation, practice, and litigation over how to keep our networks and critical infrastructure secure; new and emerging threats and how the policy process responds to them; the relationship between cybersecurity other security goods; and cybersecurity in American relations with foreign adversaries and allies.
DayZero: Cybersecurity Law and Policy Read MoreRansomware is a type of malware threat actors use to infect computers and encrypt computer files until a ransom is paid. If the threat actor’s ransom demands are not met, the files or encrypted data will usually remain encrypted and unavailable to the victim.
Protecting Against Ransomware Read MoreWord to the Wise: A router comes configured with many vendor default settings. Many of these settings are public knowledge and make your router susceptible to attacks. Remember to change your router default log-in password during your initial setup!
Home Network Security Read MoreComputers are an essential part of our everyday lives. It’s important to properly configure your home or work computer before connecting it to the internet to keep it, and your information, secure.
Before You Connect a New Computer to the Internet Read More“Actually, the issue is not that cybersecurity extends beyond computers; it is that computers extend beyond traditional laptops and desktops. Many electronic devices are computers—from cell phones and tablets to video games and car navigation systems.”
Cybersecurity for Electronic Devices Read More“Internet of Things: One way to look at it — Smart Home, Smart Assistant, Smart City, Smart Car, Smart Device — anything “Smart.”” CISA Security Tip – Securing the Internet of Things DHS, Cybersecurity and Infrastructure Security Agency CISA Security …
Securing the Internet of Things Read More“While environmental considerations are important, this is about your Data! The cell phone may be old and worthless to you, but your contact list and whatever else you have on your phone has value to criminals.”
—WWD Webmaster