Before I started covering cybersecurity, I thought the term ‘breach’ had a single meaning — that an attacker stole data from a computer system. I also thought all the different…
Browsing CategoryPrivacy
Technologies Useful In the Pandemic Are Challenging Privacy Now
Your company likely made many quick decisions back in March 2020. As an IT leader, you provided the tools employees needed to stay productive while working remotely. It had to…
What You Need to Know About Data Encryption Right Now
You might feel like you’ve heard these imperatives a million times: “You need to encrypt your data.” “Your information isn’t secure unless you encrypt it.” “You need to eat your…
Threat Modeling: The Key to Dealing With 5G Security Challenges
With 5G reshaping the smartphone market, 5G security needs to keep up. Almost one in three smartphones sold in the first quarter of 2021 can connect to a 5G network.…
How Number Recycling Threatens Your Privacy Online
There’s a lot to think about when you or your employees get new mobile phones — plans, hardware, cost. But one thing many people don’t think about is number recycling,…
How to Turn Off Amazon Sidewalk
The company is enlisting your Echo and Ring devices into an internet-sharing mesh network starting Monday. It’s not too late to opt out.
S3 Ep35: Apple chip flaw, Have I Been Pwned, and Covid tracker trouble [Podcast]
Latest episode – listen now!
“Have I Been Pwned” breach site partners with… the FBI!
If your password gets stolen as part of a data breach, you’ll probably be told. But what if your password gets pwned some other way?
Apple patches dangerous security holes, one in active use – update now!
It’s three weeks since last time. Now it’s this time, so patch now!
Naked Security Live – Jacked and hacked: how safe are tracking tags?
New episode – watch now! (And please tell your friends about our channel.)