I just finished the course 'International Cyber Conflicts' at Coursera. The course was developed and led by professors Sanjay Goel and Kevin Williams from the State University of New York at Albany. This was a five week course that consisted of recorded presentations with inline questions; discussion forums; and end of week quizzes. The presentations … Continue reading International Cyber Conflicts @ Coursera
I recently came across two very good articles about USB forensics. The Hitchhiker's Guide to USB Forensics was published at the Cyberforensicator site by Oleg Skulkin and Igor Mikhaylov. It is a very well thought out an written description of how to find out by operating system analysis what files have been copied to a USB … Continue reading USB Forensics
Today the New York Times Opinion pages offered an editorial titled 'Combating the Real Threat to Election integrity'. Authored by the Times Editorial Board the essay has two faults. One is that it continues to pile on the story that the Russian Government is responsible for cyber attacks aimed at the United States electoral system. … Continue reading Understanding the Real Threat (NY Times Editorial)
Many would consider me an Internet Old Timer. I used 'The Internet'; then ARPAnet back in the days when I worked as a Software Engineer for a US defense contractor. Securing communications and having confidence in message integrity; both in the identity of the sender and in the integrity in the content have always been … Continue reading The State of Internet Privacy? In Shambles. Moving on.
Thoughts about an interesting article that appeared in today's New York Times about the use of cellphone numbers.
Over the past two weeks I've noticed that on my iMac 1Password and Chrome have not been playing nice together. When i try to use 1Password to fill in passwords in Chrome I'm seeing the message “code signature could not be verified” pop-up. In typical 1Password fashion the message includes a link to the troubleshooting … Continue reading 1Password & Chrome on the Mac: “code signature could not be verified”
It wasn't just me. The folks at Wired have noticed that some web sites are not really very password manager friendly. I travel fairly often. Lots of that travel is for work but I do get around on personal business and to get away. One of my go to sites for travel is Hilton dot … Continue reading Websites Intentionally Disabling Password Managers
Perhaps my lowest moment as a user of the Internet came years ago. Until recently if you searched for me by name on Google and used the keyword 'Firewall' you'd see at the top of the search list a reference to an email exchange I had with some anonymous Internet user back in the early … Continue reading Respect and the Internet
In the past week I completed the work for the first MOOC (Massive Open online Course) that I've ever taken. The course was Surveillance Law which I completed via Coursera. Let me start by saying that this course was fantastic. The presenter, Jonathan Mayer from Stanford did a great job delivering a series of short … Continue reading Surveillance Law from Standford University via Coursera
A topic of much discussion of late has been reporting about a Virgina court ruling involving access to a data stored on a phone. In this case a man was charged with assaulting a woman and evidence of the crime was believed to have been recorded. A video of the assault was suspected of being … Continue reading Security Via Fingerprint Versus Pass Code