Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. The goal is to educate and equip you, so you learn how to spot the warnings signs of trouble, take quick action, and lower the risk of becoming a victim.
In T-Minus AI: Humanity’s Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented perspective that’s easy to comprehend. A recognized national expert and the U.S. Air Force’s first Chairperson for Artificial Intelligence, Kanaan weaves a compelling new view on our history of innovation and technology to masterfully explain what each of us should know about modern computing, AI, and machine learning.
Kanaan also illuminates the global implications of AI by highlighting the cultural and national vulnerabilities already exposed and the pressing issues now squarely on the table. AI has already become China’s all-purpose tool to impose authoritarian influence around the world. Russia, playing catch up, is weaponizing AI through its military systems and now infamous, aggressive efforts to disrupt democracy by whatever disinformation means possible.
America and like-minded nations are awakening to these new realities, and the paths they’re electing to follow echo loudly, in most cases, the political foundations and moral imperatives upon which they were formed.
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things off to keep track as you go.
The list provides detailed information on the following subjects:
- Use a password manager
- Create a strong device passcode
- Use two-factor authentication
- Set up a mobile carrier PIN
- Encrypt your devices
- Freeze Your Credit
- Change your DNS settings to 126.96.36.199 or 188.8.131.52
- Use a VPN
- Review the privacy of your physical space
- Use a privacy-first web browser
- Use a privacy-first search engine
- Use a privacy-first email provider
- Review location, camera, and other sensitive device permissions
- Review and remove metadata attached to photos you share
- Review your social media privacy settings
- Use encrypted messaging apps when sharing sensitive information
- Educate yourself about phishing attacks
- Keep your devices up to date
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
The Long Game: China’s Grand Strategy to Displace American Order
For more than a century, no US adversary or coalition of adversaries has ever reached sixty percent of US GDP. China is the sole exception, and it is fast emerging into a global superpower that could rival, if not eclipse, the United
States. What does China want, does it have a grand strategy to achieve it, and what should the United States do about it?
In The Long Game, Rush Doshi draws from a rich base of Chinese primary sources, including decades worth of party documents, leaked materials, memoirs by party leaders, and a careful analysis of China’s conduct to provide a history of China’s grand strategy since the end of the Cold War. Taking readers behind the Party’s closed doors, he uncovers Beijing’s long, methodical game to displace America from its hegemonic position in both the East Asia regional and global orders through three sequential “strategies of displacement.”
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the world and provide them with not only a tutorial for improving their data habits, but to transform a user’s way of thinking about why, where, when, and how to treat their data and personal information.
To top it off, Go Incognito is available free to watch, is shareable to the public through a Creative Commons license, and even offers a premium version for users who want a few more perks.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don’t have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they’re breaking and to the industry’s most famous hackers and researchers about the biggest news in cybersecurity.
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy’s arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).
For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence.
Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The Surveillance Report – featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.