- Secure computing – current state
- Communicating with decency – current state
- NSA’s ANT Division Catalog of Exploits for Nearly Every Major Software/Hardware/Firmware
- How to protect your SMS text messages from the NSA
- “The NSA is coming to town”
- It’s (crypto)party time!
- NSA whistleblower Thomas Drake: “US using the Stasi playbook”
- To be good humans we are sometimes called upon to be bad citizens
- How to send and receive encrypted emails in Windows
- False claims by Avast! antivirus
- Advanced networking with QubesOS: VPN proxyVM
- The Battle for Your Digital Soul
- How to kill meaningful social change
- Using GnuPG with QubesOS
- Bill Binney on the NSA’s domestic surveillance “Stellar Wind” program
- A few good men
- Secrets: A memoir of Vietnam and the Pentagon Papers – by Daniel Ellsberg
- What can I do about PRISM?
- Disable Java in your browsers now
- 831
- Government requests for your personal data
- Some excerpts from Evgeny Morozov’s “The Net Delusion”
- Private online communications part 2 – text chatting
- Private online communication – a matter of decency
- 784
- Echelon: a global system for the interception of private and commercial communications
- Using your taxes to monitor you
- A Skype alternative worth its salt: Jitsi
- On addresses
- Simple use of Bitcoin
- Free tools to protect your privacy online
- Book review: “Free Culture” by Lawrence Lessig
- Stop Google recording your chats
- Tor relays in the Amazon cloud: usage charges
- Stop Facebook recording your chats
- Tell websites you do not want to be tracked
- BT, you really don’t want people to read your terms of service, do you?
- Book review: “Liars and Outliers” by Bruce Schneier
- Google 2-step verification – a usability note
- The financial services industry view on cybercrime
- The myth of the pimples-ridden malware author
- Cleaning malware while travelling: A case study
- How I managed to donate to OpenStreetMap
- Amazon Kindle 3 review
- SMS 419 scams
- When automatic “software updates” break the software
- Windows Explorer: How NOT to resolve conflicts
- Don’t take control away from your users
- MBNA: Not responsible for viruses
- How much Java do you need?
- How difficult can Denplan make it for customers to protect their personal information?
- It’s a simple web page!
- Here come the “smart” phones
- Quidco cookies
- A “perfect storm” of cyber attacks
- I accept, please, no more!
- September 11th security fee
- Don’t worry, it’s as secure as Chip and PIN!
- Tracking good samaritans
- How do I clean up my computer after a virus infection?
- Free antivirus software for Windows
- Spam email statistics
- Free antivirus for Mac
- Malware infected, from the factory
- Say NO to online censorship
- A glimpse into reality – the world’s response to wikileaks
- Access to Justice
- How to close your PayPal account
- Remove junk, win disk space, better privacy
- We are losing
- Wikileaks quote
- The commercial malware industry
- Training phish
- Gmail Security checklist
- A lost battle against malware
- Old & new – software gets bloated, ergo less secure
- Cultivating cyberwar
- Blaming “computers” because they can’t talk back
- Today’s PINcode (sic)
- Free browser vulnerability scanners
- Why our way of handling SSL certificate errors is last nail in coffin of WWW security
- Security and Human Behaviour 2010 – Section 4: Culture, Risk, and Fear
- Security and Human Behaviour 2010 – Section 3: Fraud
- Security and Human Behaviour 2010 – Session 2: Foundations
- Security and Human Behaviour 2010 – Session 1: Deception
- How to keep your Windows computer secure
- A usability case study: Microsoft Online Assisted Support
- Interface design failures – Symantec Endpoint Protection
- Interface design failures – Microsoft Sharepoint
- Don’t use Adobe Acrobat Reader
- Debian GNU/Linux Squeeze – first impressions
- Ubuntu 10.4 LTS (Lucid Lynx) – first impressions