This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 2.5 License.
Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users — and secured sites — make to compromise security. And how, you may ask, did she study thousands of real passwords without compromising the security of any users? That’s a story in itself. It’s secret data worth knowing, especially if your password is 123456 …
This talk was presented to a local audience at TEDxCMU, an independent event. TED editors featured it among our selections on the home page.
Security Blanket: http://lorrie.cranor.org/blog/2013/08/12/security-blanket/
Phil Zimmermann, the creator of PGP and Silent Phone is our guest at Google, talking about communications security. How large scale deployments of end-to-end secure communications take place, the challenges this brings and the influence this focus on Enterprise has brought to the end-user. Published on Jul 6, 2016
Thanks to everyone you attended my presentation last night. You were a wonderful group and had great questions.
THE TSA IS learning a basic lesson of physical security in the age of 3-D printing: If you have sensitive keys—say, a set of master keys that can open locks you’ve asked millions of Americans to use—don’t post pictures of them on the Internet.
A group of lock-picking and security enthusiasts drove that lesson home Wednesday by publishing a set of CAD files to Github that anyone can use to 3-D print a precisely measured set of the TSA’s master keys for its “approved” locks—the ones the agency can open with its own keys during airport inspections. Within hours, at least one 3-D printer owner had already downloaded the files, printed one of the master keys, and published a video proving that it opened his TSA-approved luggage lock…
If you ask the average person what the best ways to protect themselves online are, they’ll give some true answers—but they’ll likely be different than the answers you’d get from a security researcher. Here’s the difference.
Google, in a paper they’re presenting at the Symposium on Usable Privacy and Security this weekend, asked two groups—experts and nonexperts—what they do to stay safe online. While the nonexperts provided some good answers (like using antivirus software), the experts placed certain items as much higher priority, as shown in the above graphic.
By default the Chrombook allows anyone with a Google account to sign in. But for some, that amount of sharing might be a little too open. If you would like to limit who can sign in to your Chomebook to a specific list of users, open settings and search restrict. You’ll be guided to the “Manage other users…” button. Click that then check “Restrict sign-in to to the following users:” and add the allowed usernames in the box. Click Done and close settings and now only those on your list can sign into your Chrombook. (Don’t forget you may also want to disallow Guest access too.)
There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.
Ian Urbina, author of The Secret Lives of Passwords, talks about what passwords mean to people beyond their access to email or social networking accounts. Published on Dec 29, 2014