Posted in authentication best practices online security useful stuff

Even with security flaws, you should be using a password manager

Yesterday, the Washington Post ran an article about some important security research on password managers, describing a number of serious…

Posted in online security

Things to worry about in 2019

In this post, I wanted to take a break from telling you what *I* think the things that should keep…

Posted in deep thoughts

Something’s not quite right…

Apparently, I am a man ahead of my time. While I have always sensed that there is something not quite…

Posted in authentication best practices online security useful stuff

What does your password say about you?

Using what we security experts call “crappy passwords” can be the first step in a journey to identity theft and…

Posted in online security

E.U. software bug bounties for open source software 👍

Here is a great example of how international cooperation can make the Internet more secure for us all… the European…

Posted in online security

Not all two factor authentication is created equal

Two factor authentication  is an important security tool; by using 2FA, an attacker get ahold of your user name and…

Posted in cloud computing CSO online security

Open S3 Buckets: From Bad to Worse

Just when you thought that the whole “globally readable Amazon S3 storage buckets” thing couldn’t get any worse, it did….

Posted in hacks malware online security

The (not paranoid enough) Android

The train wreck that is Android security continues… A new strain of malware by security firm Wandera found in China…

Posted in authentication cloud computing hacks online security

Beware of mobile number port out scams!

I spend a lot of time telling people to use two factor authentication on their important web accounts.  This may…

Posted in hacks online security social engineering

The ultimate outsider threat?

I know I have been blathering on about insider threats lately, so let’s go to the other extreme – the…