December 8th, 2017 by Michael Sauers

Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users — and secured sites — make to compromise security. And how, you may ask, did she study thousands of real passwords without compromising the security of any users? That’s a story in itself. It’s secret data worth knowing, especially if your password is 123456 …

This talk was presented to a local audience at TEDxCMU, an independent event. TED editors featured it among our selections on the home page.

Security Blanket: http://lorrie.cranor.org/blog/2013/08/12/security-blanket/

Posted in Tech Tagged with: , ,

July 8th, 2016 by Michael Sauers

Phil Zimmermann, the creator of PGP and Silent Phone is our guest at Google, talking about communications security. How large scale deployments of end-to-end secure communications take place, the challenges this brings and the influence this focus on Enterprise has brought to the end-user. Published on Jul 6, 2016

Posted in Tech, video Tagged with: , ,

March 25th, 2016 by Michael Sauers

Posted in Politics & Law, Tech, video Tagged with: , , , ,

November 20th, 2015 by Michael Sauers

Thanks to everyone you attended my presentation last night. You were a wonderful group and had great questions.

Secure Online Shopping from Michael Sauers

Posted in Presentations Tagged with: ,

October 3rd, 2015 by Michael Sauers

THE TSA IS learning a basic lesson of physical security in the age of 3-D printing: If you have sensitive keys—say, a set of master keys that can open locks you’ve asked millions of Americans to use—don’t post pictures of them on the Internet.

A group of lock-picking and security enthusiasts drove that lesson home Wednesday by publishing a set of CAD files to Github that anyone can use to 3-D print a precisely measured set of the TSA’s master keys for its “approved” locks—the ones the agency can open with its own keys during airport inspections. Within hours, at least one 3-D printer owner had already downloaded the files, printed one of the master keys, and published a video proving that it opened his TSA-approved luggage lock…

Source: Lockpickers 3-D Print TSA Master Luggage Keys From Leaked Photos

Posted in 3D Printing Tagged with: ,

July 28th, 2015 by Michael Sauers

If you ask the average person what the best ways to protect themselves online are, they’ll give some true answers—but they’ll likely be different than the answers you’d get from a security researcher. Here’s the difference.

Google, in a paper they’re presenting at the Symposium on Usable Privacy and Security this weekend, asked two groups—experts and nonexperts—what they do to stay safe online. While the nonexperts provided some good answers (like using antivirus software), the experts placed certain items as much higher priority, as shown in the above graphic.

 

Source: How the Experts Protect Themselves Online (Compared to Everyone Else)

Posted in Tech Tagged with: , ,

June 23rd, 2015 by Michael Sauers

By default the Chrombook allows anyone with a Google account to sign in. But for some, that amount of sharing might be a little too open. If you would like to limit who can sign in to your Chomebook to a specific list of users, open settings and search restrict. You’ll be guided to the “Manage other users…” button. Click that then check “Restrict sign-in to to the following users:” and add the allowed usernames in the box. Click Done and close settings and now only those on your list can sign into your Chrombook. (Don’t forget you may also want to disallow Guest access too.)

Posted in Tech Tagged with: ,

April 6th, 2015 by Michael Sauers

There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.

Posted in Politics & Law, video Tagged with: ,

January 2nd, 2015 by Michael Sauers

Ian Urbina, author of The Secret Lives of Passwords, talks about what passwords mean to people beyond their access to email or social networking accounts. Published on Dec 29, 2014

Posted in Internet, video Tagged with: ,

December 16th, 2014 by Michael Sauers

Here’s the video of my LastPass presentation from the Nebraska Library Association Conference presented on 10 October 2014.

Posted in Tech Tagged with: , ,

xxxfullfilms