Category: Tech

Here you can view a specific archive, or you can go to the homepage.

  • iOS vs Android: No Winner Here

    iOS vs Android: No Winner Here

    My take on the current state of iOS vs. Android.

  • Monitor Password Breaches with Firefox Monitor

    Monitor Password Breaches with Firefox Monitor

    If you’ve been on the internet for more than a few months, you’ve probably heard about a large number of data breaches that have been happening recently. The website HaveIBeenPwned is a great resource that lets a visitor put in an email address and see whether or not that email address has been part of…

  • Digital Music Reader: Buying Guide [Updated Sept 2019]

    Digital Music Reader: Buying Guide [Updated Sept 2019]

    With the newest iPads announced at Apple’s event just a few days ago, I thought that it might be worth updating my tablet recommendations since I first posted about using a tablet as a digital music reader years ago. iPads Although not everyone is an Apple fan, and certainly there are some legitimate complaints against…

  • Google Calendar Spam is 2019’s Junk Mail

    Google Calendar Spam is 2019’s Junk Mail

    Junk mail, spam email, robocalls, and now…spam Google calendar events. I had the delightful experience of getting some of this spam about 2 weeks ago. Basically I just saw a repeating event for “Win a new iPhone” every day at 6-9pm that endlessly repeated. While this is definitely an annoying thing to have happen, resist…

  • Open-source Dangers: Supply Chain Infection

    Open-source Dangers: Supply Chain Infection

    For software security, many people prefer open-source software. It’s usually functional and inexpensive, although it’s not always pretty. It also (generally) has a reputation for being more secure than closed-source software. But a rash of supply chain attacks have infected many popular open-source projects. Oftentimes the infected code is small and innocuous. As part of…

  • Understanding Email Headers

    Understanding Email Headers

    One of the most popular ways for people to get infected by malware is through email. One of my first online jobs was working for a company that is involved in email spam filtering. I still work for that company occasionally, and while it’s true that the technology to filter email has gotten more advanced,…

  • Bluekeep: Bad to Very Bad

    Bluekeep: Bad to Very Bad

    The Windows Bluekeep vulnerability was already bad. Now it’s even worse.

  • The Quest to Cripple Encryption

    The Quest to Cripple Encryption

    It shouldn’t come as a surprise, but it looks like the Attorney General (as well as law enforcement in general) doesn’t understand how encryption works. At a cybersecurity conference at Fordham University in late July Barr lamented the expanding presence of encryption. In the speech, Barr is trying to play consumers (that use and benefit…

  • Amazon (Also) Wants Your Data

    Amazon (Also) Wants Your Data

    It’s not just Facebook and Google that are after data. It looks like the e-commerce juggernaut Amazon is getting into the action as well. This past Prime Day, Amazon offered $10 of Amazon credit for users that spent $50 and installed the Amazon Assistant extension. Amazon Assistant is an extension for almost every common web…

  • Why UX Matters

    Why UX Matters

    It’s possible to make a website that looks fine, but is totally useless. Here’s how!