Any serious discussion on modern privacy and surveillance is subject to the unnamed but universal law that George Orwell’s novel 1984 must be referenced in some way at some point. In his new book published in September 2020, titled Life After Privacy, …
Graham Ivan Clark, Onel de Guzman and Michael Calce. These three names will go down in the history of internet commerce, right alongside Jack Dorsey, Mark Zuckerberg and Jeff Bezos.
End user license agreements (EULAs), and other contracts between consumers and vendors such as terms and conditions (T&Cs), privacy policies, and acceptable use policies, are a ubiquitous part of life online. We need to agree to a EULA, and often a…
It took a global pandemic and the death of George Floyd to put deep-seated social inequities, especially systemic racism, front and center for intense public debate.
Crime Prevention Through Environmental Design, or CPTED, defines the premise that any community – whether a place of business, office building or neighborhood – can be made safer and more secure by efficient planning and design. The architecture and la…
What are bug bounties?
Every company needs to find and fix flaws in its products or services. As software becomes more complex, feature-rich and integrated, it gets harder – if not impossible – to eliminate all bugs. Now that users have accepted an al…
What are bug bounties?
Every company needs to find and fix flaws in its products or services. As software becomes more complex, feature-rich and integrated, it gets harder – if not impossible – to eliminate all bugs. Now that users have accepted an al…
Controlling access is the basis of all security. The right people should be allowed in, and the wrong people kept out. This is done by confirming – or authenticating – the identity of the person seeking access, and then checking that the person is auth…
Phishing is the most prolific category of cyber scam. Others include romance scams, mugged in London scams, advance fee frauds and many more. Most scams seek to part you from your money – phishing is unique in seeking your personal data, usually in the…
Parents have long held a special duty to protect their school-aged children from bad actors on the Internet.