Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Tag: Russia

a ball peeking out from the corner - Photograph: Serg Myshkovsky/Getty Images
Articles / CyberSecurity

Open Source Intelligence May Be Changing Old-School War

Intelligence collected from public information online could be impacting traditional warfare and altering the calculus between large and small powers.

Open Source Intelligence May Be Changing Old-School War Read More
Computing & Technology / Books, Reports, Films & Images

How Bellingcat is using TikTok to investigate the war in Ukraine

The data detectives at Bellingcat showed 60 Minutes how social media is providing evidence of alleged Russian war crimes and other atrocities.

How Bellingcat is using TikTok to investigate the war in Ukraine Read More
Skyscrapers in the Moscow-City business center in Moscow on April 29. (Maxim Shemetov/Reuters)
Articles / CyberSecurity

Hacking Russia was off-limits. The Ukraine war made it a free-for-all

Experts anticipated a Moscow-led cyber-assault; instead, unprecedented attacks by hacktivists and criminals have wreaked havoc in Russia

Hacking Russia was off-limits. The Ukraine war made it a free-for-all Read More
U.S. President Joe Biden delivers remarks on developments in Ukraine and Russia to reporters - Photograph: Drew Angerer/Getty Images
Articles / CyberSecurity

How Russia’s Invasion Triggered a US Crackdown on Its Hackers

The Biden White House is using “all of the levers of national power” to counter—or preempt—cyberattacks by Russia’s most dangerous hacker groups.

How Russia’s Invasion Triggered a US Crackdown on Its Hackers Read More
Russian soldiers sitting on a tank - Photograph: Sefa Karacan/Getty Images
Articles / CyberSecurity

Russia Is Leaking Data Like a Sieve

Ukraine claims to have doxed Russian troops and spies, while hacktivists are regularly leaking private information from Russian organizations.

Russia Is Leaking Data Like a Sieve Read More
How Bellingcat uncovered Russias secret network of assassins - Bellingcat / Getty Images / WIRED
Articles / CyberSecurity

How Bellingcat uncovered Russia’s secret network of assassins

From Sergei Skripal to Alexei Navalny, Russia’s attempts to silence its enemies have been forensically exposed. At the centre of these revelations has been investigative unit Bellingcat

How Bellingcat uncovered Russia’s secret network of assassins Read More
Rescuers carry a wounded person on the stretcher as they respond to shelling in central Kharkiv, northeastern Ukraine, on March 1, 2022. - (Photo by Vyacheslav Madiyevskyy/Ukrinform/NurPhoto)
Computing & Technology / Articles

Hospitals Bombed and Apartments Destroyed: Mapping Incidents of Civilian Harm in Ukraine

With more videos and images coming to light each day, Bellingcat and members of its Global Authentication Project have begun to log and map these incidents on an interactive TimeMap.

Hospitals Bombed and Apartments Destroyed: Mapping Incidents of Civilian Harm in Ukraine Read More
Ukrainian soldier standing on top of a seized Russian military tank in the woods - Photograph: Metin Aktas/Getty Images
Computing & Technology / Articles

As Russia Plots Its Next Move, an AI Listens to the Chatter

With vast amounts of data becoming available to intelligence analysts, new tools will help them sift and interpret it all—but they will introduce new risks, too.

As Russia Plots Its Next Move, an AI Listens to the Chatter Read More
Silhouette of a person standing in front of the Kremlin's Spasskaya tower and St Basil's cathedral at sunset in Moscow.. - Photograph: Getty Images
Computing & Technology / Articles

Russia Is Facing a Tech Worker Exodus

With founders and developers scrambling for the exit, the Russian tech scene is taking a major hit.

Russia Is Facing a Tech Worker Exodus Read More
home routers stacked on top of each other - Photograph: Getty Images
Articles / CyberSecurity

Russia’s Sandworm Hackers Have Built a Botnet of Firewalls

Western intelligence services are raising alarms about Cyclops Blink, the latest tool at the notorious group’s disposal.

Russia’s Sandworm Hackers Have Built a Botnet of Firewalls Read More
Illustration of Ukrainian flag made of code - Illustration by Nicholas Konrad / The New Yorker
Articles / CyberSecurity

The Threat of Russian Cyberattacks Looms Large

So far, the Russian invasion of Ukraine has not involved the sort of devastating cyberattacks that many anticipated. But it’s not clear why, or whether that pattern will hold.

The Threat of Russian Cyberattacks Looms Large Read More
Ukrainian troops. (Official photo by the Ministry of Defense of Ukraine)
Articles / CyberSecurity

Cyber Realism in a Time of War

“For all the talk about ‘cyber war’, today shows that when conflict escalates to this point it is secondary. If you want to take out infrastructure then missiles are more straightforward than using computer code. Cyber’s main role now is perhaps to sow confusion about events.”

Cyber Realism in a Time of War Read More
An illustration of a hacker wearing a Putin mask. - Illustration: WIRED; Getty Images
Articles / CyberSecurity

Leaked Ransomware Docs Show Conti Helping Putin From the Shadows

Members of the hacker gang may act in Russia’s interest, but their links to the FSB and Cozy Bear hackers appear ad hoc.

Leaked Ransomware Docs Show Conti Helping Putin From the Shadows Read More
a woman walking - Photograph: DIMITAR DILKOFF/Getty Images
Articles / CyberSecurity

The Russian Disinfo Operation You Never Heard About

The campaign known as Secondary Infektion appears to be a distinct effort from the meddling of the IRA and GRU—and it went undetected for years.

The Russian Disinfo Operation You Never Heard About Read More
A collage with a demonstrator waving a Ukrainian flag. - Illustration: Elena Lacey; Getty Images
Articles / CyberSecurity

Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine

A wave of cyberattacks meant to make a statement and particularly buoy Ukraine could have unintended consequences.

Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine Read More
people watch Vladimir Putin's address - AP Photo/Denis Kaminev, File
Computing & Technology / Articles

Activists are using ads to sneak real news to Russians about Ukraine

From pop-up notifications to Facebook ads, campaigners in Ukraine and beyond are using any means necessary to beat Russia’s information firewall.

Activists are using ads to sneak real news to Russians about Ukraine Read More
Multicolored ethernet cables tangled into a ball against a black background - Photograph: Nikuwka/Getty Images
Computing & Technology / Articles

Why ICANN Won’t Revoke Russian Internet Domains

The organization says cutting the country off would have “devastating” effects on the global internet system.

Why ICANN Won’t Revoke Russian Internet Domains Read More
Cartoon padlock and broken glass superimposed on a Russian flag. - Cartoon padlock and broken glass superimposed on a Russian flag. Enlarge Sean Gladwell / Getty Images
Computing & Technology / Articles

Why Russia’s “disconnection” from the Internet isn’t amounting to much

So far, moves by two of the Internet’s major pipelines are having negligible effects.

Why Russia’s “disconnection” from the Internet isn’t amounting to much Read More
Russian serviceman operating a T72B3 tank of the Russian Southern Military District's 150th Rifle Division in a snowy field - Photograph: Erik Romanenko\Getty Images
Computing & Technology / Articles

Online Sleuths Are Using Face Recognition to ID Russian Soldiers

It takes five minutes to put a name to a soldier’s face using little more than a screenshot, but there’s a catch.

Online Sleuths Are Using Face Recognition to ID Russian Soldiers Read More
Illustration of wifi symbol made of fortified metal - Illustration: Sam Whitney; Getty Images
Articles / CyberSecurity

How Ukraine’s Internet Can Fend Off Russian Attacks

The besieged country’s complex internet infrastructure has evolved to promote resiliency.

How Ukraine’s Internet Can Fend Off Russian Attacks Read More

Posts navigation

1 2 3 Next

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • Cybersecurity as Illuminator for the Future of Computing Research
  • Two Paths for Digital Disability Law
  • Raising Robovoices
  • Modern Tech Can’t Shield Your Secret Identity
  • A Call to Action
  • The Troubling Future for Facial Recognition Software
  • Winter Storm Elliott – December, 2022
  • Technology’s Impact on Morality
  • Trust, Regulation, and Human-in-the-Loop AI: within the European region
  • How Facebook and Google fund global misinformation

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

•    Dictionaries, Glossaries and Other Resources
•    Glossary of Terms (Tag Terms)
•    Links

Categories (Number of Articles in each)

  • — Broad Topics (606)
    • Climate (19)
    • Computing & Technology (301)
    • CyberSecurity (216)
    • Web Resources (38)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (36)
      • – WSU Resources (8)
    • Street Art (3)
  • — Form Types (590)
    • Articles (501)
    • Books, Reports, Films & Images (62)
    • News & Information (29)
    • Organizations (4)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (50)
  • Artificial Intelligence Research (6)
  • Avalanche Education (7)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (8)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (5)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (6)
  • Computer Crimes (5)
  • Computer Security (17)
  • Computing Education (9)
  • Coronavirus-Covid19 (14)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (10)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (10)
  • Ethics (28)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (6)
  • Geopolitics (9)
  • Google (Firm) (7)
  • Government Policy (11)
  • Government Regulation (11)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (29)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (18)
  • History – Internet (15)
  • History – Silicon Valley (8)
  • How To (9)
  • HTML (5)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (14)
  • Law & Policy (6)
  • Machine Learning (11)
  • Malware (9)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (5)
  • Passwords (7)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (8)
  • Privacy & Personal Information (10)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (7)
  • Resources (5)
  • Russia (41)
  • Security (9)
  • Security Guidance (7)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (25)
  • Spyware (8)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (5)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (7)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Phenomena (6)
  • Web Accessibility (5)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi  is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

January 22-28, 2023 is Data Privacy Week

Mum’s the word…

National Cybersecurity Alliance - Data Privacy Week Logo

Featured Books

Book Cover - A Biography of the Pixel
Book Cover - Steve Jobs
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage
Book Cover - A New History of Modern Computing: How the computer became universal
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Book Cover - Hackers: Heroes of the Computer Revolution
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton
Book Cover - We Have Root: Even More Advice from Schneier on Security
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed.
Book Cover - Facebook: The Inside Story by Steven Levy
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America
Book Cover- Permanent Record
Book Cover - The Perfect Weapon
Book Cover - Dawn of the Code War
Book Cover - Zucked
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier
Copyright © 2020-2023 Wallace Web Design, LLC
Scroll to Top