Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
WifiInfoView from Nirsoft is a free, portable Windows app that provides a ton of useful information about your Wi-Fi environment. → Read More
For security purposes, it's best to stay away from Internet Explorer. But if you do run it, follow these steps to ensure it uses TLS 1.2. → Read More
I left my Chromebook on a bus yesterday, and my own Defensive Computing let me down. → Read More
After having tweaked Firefox to only use TLS version 1.2, one website can verify that the tweak worked and another can test it. → Read More
Whats behind the curtain of HTTPS is TLS. There are three versions of the TLS protocol and there is no reason to still support the oldest two versions. A simple tweak of Firefox can insure it only supports the most secure version, TLS 1.2. → Read More
Thanks to WikiLeaks, we now know air gapping is insufficient. But all is not lost, a Chromebook can pump up the protection of air-gapped computers. → Read More
There is, financially, a high price to be paid, by anyone who wants Android bug fixes. What is someone who doesn't need high end hardware to do? → Read More
Traveling a well-worn route, there is yet another update to Adobe's Flash Player. No critical security flaws. → Read More
Ten days after defending Windows XP against WannaCry, Microsoft adds detection and removal of WannaCry/WannaCrypt to the Windows Malicious Software Removal Tool (MSRT). → Read More
It wasn't all that long ago that the Chromebook was seen as an experiment that was doomed to fail. After all, what would people do with an operating system that was designed to work mainly in the cloud? When the first units came on the market in 2011, they were greeted with curiosity by some and outright hostility by others. Despite that, their light weight, low cost and easy-to-use interface… → Read More
Because of the way Apple has configured iCloud.com and various sections of apple.com, spy agencies can learn your Apple ID password. → Read More
Due to long-standing security practices at Amazon, the email address on file for an Amazon.com account should never be used anywhere else for anything. → Read More
On December 28th Adobe released a new version of the Flash Player with 19 bug fixes. It seems they left one out as yet another Flash update was made available on New Years Day. → Read More
Lenovo seems to be testing the boundaries of trust. → Read More
Wi-Fi can be done securely, even at a hacker conference like DEF CON. Just avoid open networks and Android. → Read More
Chrome users can not buy tickets at Ticketmaster if they did the Defensive Computing thing and configure Flash for click-to-play. → Read More
Enough already with the Flash Player. It has generated five bugs a week so far in 2015. Removing it, is not only good Defensive Computing, it also helps everyone else. → Read More
On a recent plane trip, I looked into the architecture of the Wi-Fi networks onboard, and couldn't find any security. → Read More
TaskSchedulerView, a new program from Nir Sofer, offers a great view into the Windows scheduler database. Take a peek under the hood, you never know what you'll find. → Read More
Windows 10 is new, shiny and best avoided - for now. → Read More