“Light Blue Touchpaper” is the blog of the University of Cambridge Computer Laboratory and is written by researchers in the Security Group. Read here brief and timely essays on recent developments and topics related to computer security.Light Blue Touchpaper Read More
The National Cyber Security Alliance’s (NCSA’s) CyberSecure My Business™ is a national program helping small and medium-sized businesses (SMBs) learn to be safer and more secure online.CyberSecure My Business Read More
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it.Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers Read More
News about Computer Security (Cybersecurity), including commentary and archival articles published in The New York Times.The New York Times – Computer Security / Cybersecurity News Read More
Advice on how to stay safe with iOS, Android, MacOS, Windows, Your TV, and Routers.How to Update All Your Gear (For Safety!) Read More
Before you go in search of that next sassy cat photo, pressing meme or joke about the Art of the Deal from OccDems make sure your OS is current.Don’t let pirates slice-n-dice your iOS Device Read More
I am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998. I’m a Special Advisor to IBM Security, a fellow and lecturer at Harvard’s Kennedy School, and a board member of EFF. This personal website expresses the opinions of none of those organizations.Schneier on Security – “Crypto-Gram” Newsletter Read More
The latest news, opinion and research in security, from Communications of the ACM online.Communications of the ACM – Security Read More
“KrebsOnSecurity.com is a daily blog dedicated to investigative stories on cybercrime and computer security.”Krebs on Security Read More
Computers are an essential part of our everyday lives. It’s important to properly configure your home or work computer before connecting it to the internet to keep it, and your information, secure.Before You Connect a New Computer to the Internet Read More
“Internet of Things: One way to look at it — Smart Home, Smart Assistant, Smart City, Smart Car, Smart Device — anything “Smart.”” CISA Security Tip – Securing the Internet of Things DHS, Cybersecurity and Infrastructure Security Agency CISA Security …Securing the Internet of Things Read More
“While environmental considerations are important, this is about your Data! The cell phone may be old and worthless to you, but your contact list and whatever else you have on your phone has value to criminals.”
“While this is beyond the scope of the average daily home-user, it nonetheless provides good information about what you can do to minimize your chances of your computer becoming infected. You can benefit from it even if you don’t understand everything in it.”
“Threats to your computer will continue to evolve. Although you cannot eliminate every hazard, by using caution, installing and using antivirus software, and following other simple security practices, you can significantly reduce your risk and strengthen your protection against malicious code.”Protecting Against Malicious Code Read More
“The inside story of how America’s enemies launched a cyber war against us-and how we’ve learned to fight back…”
Includes links to:
“The Lawfare Podcast: John Carlin on ‘Dawn of the Code War’“ by Jen Patja Howell. Saturday, November 24, 2018.
A discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15, 2019 at the Center for Strategic & International Studies.
John Carlin on “Stay Tuned with Preet” Dec. 4, 2018.
You are under surveillance right now.
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Read More
Welcome to the businessworld.com. It’s digital: Information is more readily accessible than ever. It’s inescapably connected: businesses are increasingly–if not totally–dependent on digital communications. But our passion for technology has a price: increased exposure to security threats. Companies around the world need to understand the risks associated with doing business electronically. The answer starts here.Secrets & Lies: Digital Security in a Networked World Read More