Apple announced that the new iPhone will include TouchID to allow users to make purchases by identifying themselves with a fingerprint. Sounds great, right? But while biometrics (such as fingerprints, palm prints, and retina scans) do have some advantages over passwords, they have their weaknesses too. And, yes, fingerprints can be stolen. I'm not talking … Continue reading How to steal a fingerprint
Tag: Security
"I was hacked." It's an overused phrase. It's what people say when their email address is used to send spam. It's what people say when they lose control of their social media accounts (or sometimes as a lie to cover up inappropriate posts to social media). It's what people say when their web site has … Continue reading Stop saying “I was hacked,” raise security awareness instead
This is the story of someone who publicly released government documents and was ruthlessly pursued by the U.S. government for his actions, but this is not the story of Edward Snowden. This is not the story of Bradley Manning either. This is the story of Aaron Swartz, and it doesn't have a happy ending. Aaron Swartz … Continue reading Forget Edward Snowden, Aaron Swartz is your true Internet hero
The hacker group Anonymous called for a voluntary Internet blackout to protest CISPA, but at this time no major websites seem to be participating. So what is CISPA anyway, and why would anyone want to protest it? Furthermore, why did the CISPA blackout fail to get high profile participants? What is CISPA? CISPA is the … Continue reading What is CISPA and what happened to the planned blackout to protest it?
Apple has introduced two step verification for Apple ID. If you use iTunes, iCloud, an iPhone, iPad, Mac or basically an Apple thing you should activate Apple two step verification now. Apple two step verification protects your data by requiring an additional code when you log in using your Apple ID. This prevents someone else … Continue reading How to turn on Apple two step verification and why you should