security

The Dark NetThere are huge chunks of the Internet that can’t be found with your standard web browser. Criminals, anarchists, and trolls use encryption-enabled browsers to conduct their business anonymously in these dark corners of the net. In this fascinating Fresh Air interview, author Jamie Bartlett talks about his experiences in the dark net.

npr.org/sections/alltechconsidered/2015/06/03/411476653/infiltrating-the-dark-net-where-criminals-trolls-and-extremists-reign

Be the first to comment

Many people believe that privacy is a thing of the past. It’s true that our networked world makes it harder to keep secrets. But there are many things you can do to protect your privacy online. This Huffington Post article clearly outlines some quick fixes you can make in a few minutes.

Be the first to comment

Holding Your Files Hostage

December 22, 2014

Malware makers are always coming up with new ways to exploit innocent computer users. One relatively new breed of malware, ransomware, encrypts files, making them effectively unusable, unless their owners pay ransom to the perpetrators. This short NPR story focuses on this very real threat.

Read the full article →

Is Privacy History?—Snowden’s Message

January 2, 2014

Earlier this year Edward Snowden made a decision that changed the world. By leaking top secret government documents to the press, he revealed that US surveillance of private and public citizins goes far beyond what most of us had previously imagined. Because of those leaks, people all around the world are asking important questions about the balance between privacy and security in a free society.

Read the full article →

Cyber Security: When Does Defense Become Offensive?

February 16, 2013
Thumbnail image for Cyber Security: When Does Defense Become Offensive?

In his state of the union message President Obama explained that he was issuing executive orders to deal with cyber threats to government and business. He also encouraged congress to enact legislation. But the problem may require a more aggressive approach that’s complicated by the fact that our information infrastructure is mostly owned by private businesses.

Read the full article →

How Scam-savvy Are You?

December 7, 2012
Thumbnail image for How Scam-savvy Are You?

Cyber-scammers are always looking for new ways to get you to reveal valuable personal information. Can you tell the difference between legitimate requests and cyber scams? Take this short quiz to find out.

Read the full article →

How to Avoid a Personal Digital Meltdown

August 21, 2012
Thumbnail image for How to Avoid a Personal Digital Meltdown

Wired writer Mat Honan recently lost just about everything he had stored on his computer and in the cloud. This NPR story suggests five things you can do to avoid his fate.

Read the full article →

Another Take on the Classic Sci-Fi Plot

June 23, 2012
The first commercially-sold silicon transistor from Texas Instruments

If we think of digital technology as another life form, how does that change the way we think about, and interact with, that technology? This Forbes editorial suggests that it might improve the way we handle computer security.

Read the full article →

No Longer Anonymous?

June 21, 2012
Parmy Olson on The Daily Show

The secret global Internet subculture known as Anonymous has generated plenty of headlines, but most people don’t know much about it. Journalist Parmy Olson’s book, “We Are Anonymous”, reveals how the organization works and how it is evolving. In this light-hearted interview with Jon Stewart on the Daily Show she talks about what she learned writing the book.

Read the full article →

The Web is Watching You

June 9, 2012
Photo from TEDTalk about tracking the trackers

If you think you’re covering your tracks as you explore the web, think again. This TED talk shows how we’re being tracked and suggests what we might need to do about it.

Read the full article →