Author: Kent Lawson

Honey Encryption: A New Tool to Deceive Hackers

Every time we turn around, it seems, we read that hackers have penetrated another company’s supposedly “impenetrable” servers.

Researchers have created a new tool called Honey Encryption, and it’s anything but sweet for criminals who want to get their hands on sensitive customer data.

Hacking at 36,000 Feet: The Ease of Spying On the Person in Seat 2B

Flying from New York to San Francisco last week, I had the opportunity to check out the (unencrypted) GoGo wifi service on the plane. As my interest was purely curiosity, I used a tool that just lists the names of the websites that people are visiting. So what are people doing on the Internet at 36,000 feet?

Businesses (and Airports) are Tracking You

Businesses are tracking you. Airports are tracking you too. As you shop in your city or enjoy a preflight cocktail at the airport bar, tracking systems are watching you. They are able to do this by placing tracking sensors that use location data emitted by your cell phone when it has WiFi turned on.

The EFF Has Your Back

The tide is changing online, and companies need to make a commitment to users that their information is just that, theirs. Helping with this promise is the Electronic Frontier Foundation (EFF).  They have released an annual report titled, “Who Has Your Back?” taking a closer look at the privacy policies of major Internet companies. Read on to learn which companies are protecting your privacy.

TED Talks, Part 3: Understanding Smart Device Hacking (Pacemakers, Phones, Fridges, Even Toilets)

TED is a non-profit organization which organizes and hosts a variety of speakers from all walks of life. Recently, TED hosted a series of talks called “The Dark Side of Data.” In Part 1 of our series we reviewed online privacy, and in Part 2, we reviewed three types of online attacks.

Today’s final installment of our 3-part series investigates Avi Rubin’s talk about smart device hacking — phones, refrigerators, and even pacemakers can be hacked. Rubin is a professor of computer science and director of Health and Medical Security at Johns Hopkins. He works on computer and information security, with a focus on electronic medical records.

TED Talks, Part 2: Understanding the Three Types of Online Attacks

TED is a non-profit organization which organizes and hosts a variety of speakers from all walks of life. Recently, TED hosted a series of talks called “The Dark Side of Data.” In Monday’s Part 1 of our series about these talks, we discussed Big Data. Today in Part 2, we review the talk by Mikko Hypponen on the three types of online attacks. Mikko is the chief research officer at F-Secure Corporation in Finland, and is an expert in computer viruses. He’s also an expert on how to protect digital privacy in the age of government surveillance.

TED Talks, Part 1: The Dark Side of Data and Why Online Privacy Is Important

TED Talks are a very large collection of 15-minute presentations from various experts around the world on just about any topic you can think of — and many that you could not. TED is a non-profit which organizes and hosts a variety of speakers from all walks of life.Recently, TED hosted a series of talks called “The Dark Side of Data” in which different speakers explained how Big Data can be a force for good, and how it can be abused.

Alessandro Acquisti, who studies the economics of privacy and information security in social networks, gave a talk called “Why Privacy Matters.” You can watch his talk here.