by Greg Scott | Feb 17, 2018 | Cybersecurity, Technology
Way back in 2005, some friends and I set up a nonprofit named Operation America Cares. We offered free video services for American families connecting with loved ones serving overseas in the military. I have great memories from that period, but by 2010,...
by Greg Scott | Feb 12, 2018 | Cybersecurity, Technology
Many bloggers and small businesses build websites using service providers such as WordPress or Wix, and friends and family find them using names like mysite.wixsite.com, or mysite.wordpress.com. This is okay for a hobby. But it doesn’t work for anyone trying...
by Greg Scott | Dec 18, 2017 | Slice of Life
An email came in the other day from the GOP, the United States Republican party. The party I used to respect. It claimed to be a one question survey. The question was, “The president’s job performance has been…” My choices were great, good,...
by Greg Scott | Dec 16, 2017 | Cybersecurity
I keep asking myself, why do we still see sensational data breaches almost every week? Are attackers really that much smarter than the good guys? The short answer is, no, they’re not. Attackers win because the good guys do a lousy job of defense. The...
by Greg Scott | Nov 8, 2017 | Memoir
It was the summer between fourth and fifth grade, in Phoenix, Arizona. By the time fourth grade ended, I was on my tenth school, including kindergarten. Four in the fourth grade alone. Fifth grade would be the first time I started a new school year in the same school...
by Greg Scott | Oct 25, 2017 | Cybersecurity
The politicians are at it again. This time, US Deputy Attorney General, Rod Rosenstein, wants tech companies to come up with a concept he calls, “responsible encryption.” I wrote a blog post about government putting its fingers in encryption in early 2016,...
by Greg Scott | Oct 19, 2017 | Cybersecurity
In Mid October, 2017, Mathy Vanhoef set up a website to demonstrate an attack he discovered and named KRACK Attack that rocked the WiFi world. For a security researcher, this was the mother-load. He discovered a flaw in the WPA2 protocol that...
by Greg Scott | Oct 7, 2017 | Cybersecurity
I’ve tried and failed to convince more people than I can remember why they should care about Internet security. Typical responses include eye rolls, yawns, looking at their watch, and taking “important” cell phone calls. Yes, I do notice. As an IT...
by Greg Scott | Sep 19, 2017 | Cybersecurity
Update Sept. 26, 2017 I put together three video presentations about what went wrong with the Equifax fiasco and what to do about it. Here is a video presentation about what went wrong. Here is a video presentation with a structural approach to fixing the system. Here...
by Greg Scott | Sep 11, 2017 | Cybersecurity
I shared my initial thoughts about the Equifax data breach in this post from Sept. 8, 2017. And here is the recording from my WCCO Radio interview with Jordana Green and Paul Douglas. What follows is an update as of Sept. 11, 2017. (As of Sept. 14, 2017, this...
Recent Comments