The dead have always tried to speak to us. Walk through almost any graveyard and you will see epitaphs written by those whose physical remains have long since blended with the soil while their words live on. Such words give the living a sense of the character of the person interred beneath the stone. Here … Continue reading Talking to the Dead in Virtual Graveyards: Digital Death and Virtual Resurrection
The purpose of LinkedIn is to help people make business contacts. It’s natural, then, that if someone wants to become one of your contacts, you will accept them, right? Well, there are people out there who will be happy to become your contact, but who have absolutely no interest in doing business with you. Sure, … Continue reading How Many of Your LinkedIn Contacts are Fake and What Do They Want From You?
When I was recently asked this question about saving passwords in the browser, my instinctive response was to say, “no, of course not.” After all, I reasoned, a browser is just software, and all software is vulnerable to a variety of cyber attacks. But instead of responding immediately, I decided to look into this a … Continue reading “Should I let the browser remember my password?” Not as Easy a Question as You May Think
It’s that time when cybersecurity firms are predicting what will happen in the year ahead. But, as I reported in my last post, often the most serious cybersecurity breach is never even considered. No one really thought the entire internet would be put at risk by a DDoS attack or that the hacking of the … Continue reading What Do the Top Cybersecurity Firms Predict for 2017?
To continue a seasonal tradition I began a few years ago, I will assess how some major cybersecurity firms (as well as myself) did in predicting the cyber attacks for the past year. The reason for doing this is that most firms are quite happy to put out predictions, but rarely do we see them … Continue reading How Did Major Cybersecurity Firms do in Predicting the Breaches of 2016?