Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Government Will (Finally) Encrypt All Laptops

It's almost like they don't even know what they're doing.
(Image is in the Public Domain)

Schneier reports that the government will begin encrypting all laptops. This is in response to case after case of stolen laptops leading to loss of personal data such as in the case with the Veterans Administration.

Considering that the typical response is to offer worthless credit monitoring services to make .... [Click here to read the rest of this post]

Tags: , ,

Sony Settles for $4.5 Million for their Illegal CD-Virus

Sony literally hacked US citizens and got a slap on the wrist.
(Image used under: Creative Commons 2.0 [SRC] [Mod] [Comp])

Consumer Affairs reports a settlement with 39 states for Sony's use of a "rootkit" to try and prevent users from copying their music. This forced DRM was detected by computer experts and quickly raised a stir.

Most importantly,

Sony said it was "pleased" .... [Click here to read the rest of this post]

Tags: , , , , ,

New State Laws Allow Security Freezes

According to Consumer Affairs, Hawaii, Kansas, New Hampshire, Oklahoma, Pennsylvania, Rhode Island and Wisconsin now have Credit Freeze laws. However, it sounds as if you must be a victim before you can use the law (which is really, really stupid). A friend said once that this is like having to wear a seatbelt, but only after you've been in a car wreck. Sounds like a good analogy to me.

.... [Click here to read the rest of this post]

Tags:

Microsoft Finally Adds Stupidly Obvious Security Feature

(Image used under: Fair Use doctrine)

The Washington Post reports that IE 7 will not have the long known flaw that allows a website to steal the data that may be hanging out in your clipboard.

For those who don't know, the clipboard is where anything you cut and paste hangs out. The trick is, it stays there until you cut or copy something else. .... [Click here to read the rest of this post]

Tags: , ,

The Electronic Frontier Foundation Takes on the DHS’s Secret Profiling Program

Automated profiling at a distance. Very reassuring.
(Image is in the Public Domain)

The EFF (who is also the organization spearheading the lawsuits against AT&T) is now taking on the secret profiling program that has hit the news recently. From their e-newsletter:

The Automated Targeting System (ATS) creates and assigns "risk assessments" to tens of millions of citizens as they enter and leave the country. .... [Click here to read the rest of this post]

Tags: , , ,

Ancient Telephone Tax Repealed – Three Year Refund Due Consumers

100 years late. Better late than never?
(Image used under: Creative Commons 2.0 [SRC])

In the CAGW newsletter, they report that:

In a widely-heralded and very long-sought victory for CAGW and all taxpayers, the Treasury Department announced last May that it would stop collecting the excise tax on long distance telephone service. Known as the Spanish-American War Tax, this "temporary" tax on phone service, considered .... [Click here to read the rest of this post]

Tags: ,

Government Says They Can Read Your E-mail Without a Warrant

Keeping your mail private is not as easy as it should be.
(Image used under: Creative Commons 3.0 [SRC])

In this article, they explain that the Government can use the laws the way they're written now to read any e-mail that is hosted on someone else's computer (like the servers at AOL, Google, Hotmail).

A man who was partially convicted based on his e-mails is suing saying .... [Click here to read the rest of this post]

Tags: ,

RFID Passports Still Broken – Only Faster Now

Wireless data is easy to steal. Why did we put it on our passports again?
(Image is in the Public Domain)

Schneier links to an article about RFID passports being cloned in under 5 minutes. The authorities have stopped denying it's possible and have shifted to denying that it can be used for any nefarious purposes.

The UK Home Office however dismissed the ability .... [Click here to read the rest of this post]

Tags: , , ,

College Student Proves TSA “Boarding Pass/ID Check is Useless”

I never thought about it, but it's much easier to defeat TSA security than I realized.
(Image is in the Public Domain)

Bruce Schnier found an intereting article in the NY Times about a bored computer science student wrote a webpage that printed nearly identical boarding passes to those used by Northwest Airlines. Using the fake passes, people were successfully able to bypass airport security. The .... [Click here to read the rest of this post]

Tags: , ,

Fake Word-of-Mouth Advertising from Sony Goes Wrong

Hey there fellow kids. Who wants a PSP fur Realz?
(Image used under: Fair Use doctrine)

In an amusing example of fake marketing, Sony created a fake website called "alliwantforchristmasisapsp" where two employees of their marketing firm pretended to be young, hip gamers who blogged about wanting a PSP.

According to the 1-up article on the debacle:

The tide began to turn against Sony's .... [Click here to read the rest of this post]

Tags: , , , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]