Robocall-driven spam/scam calls are out of control. I know, what else is new, but I mean REALLY out of control. Until I developed the system I am about to show you, my phone would ring up to 10 times a day from scam/spam calls at all hours, even after I had implemented my carrier’s spam … Continue reading Take Control: Spam Calls
As I referenced in the Linkedin post below, spying should be assumed until proven otherwise for all Chinese-sourced digital products. China has a well-documented history of spying for the purpose of stealing intellectual property as well as gathering real-time intelligence, for both commercial and military purposes, and the groups behind both activities are often the … Continue reading China - Espionage or Sabotage?
Dark Reading’s 2021 Strategic Security Survey was highly informative, not only in what it did include but also in what it did not. In particular, when asking 150 technical and cybersecurity professionals to rate the effectiveness of cybersecurity practices, there are 3 practices in particular that leaped out at me as missing from the survey results … Continue reading No wonder we keep getting breached…
As soon as the idiocy known as DNS over HTTPS (DoH) first appeared, I was one of the first to warn how this was a fundamentally bad idea. It breaks the widely used DNS-based controls that individuals, families, and businesses have deployed in recent years to restrict access to malicious and unwanted (porn, social media, … Continue reading Looking for dohservers.txt?
If you are using country geo-blocks on your firewall as I recommend, it is important to remember that Hong Kong is now indistinguishable from China when it comes to data privacy. With the return of Hong Kong to China’s control and the addition of the National Security Law to Hong Kong’s Basic Law, this means … Continue reading Hong Kong is China