Michael Horowitz

Michael Horowitz wrote his first computer program in 1973 and has been a computer nerd ever since. He spent 20 years working in an IBM mainframe environment as both an application developer and a DB2 DBA. He then spent a few years working in the Research and Development group of a large Wall Street firm. He has also done technical writing and teaching. He is an independent consultant who has long been focused on Defensive Computing. His personal site is michaelhorowitz.com. This is a weblog of Michael Horowitz. The opinions expressed here are those of Michael Horowitz and may not represent those of Computerworld.


Wi-Fi security vs. government spies

Wi-Fi security vs. government spies

Its one thing to be lectured to about Wi-Fi security and quite another thing to see an actual spy manual. The Intercept just published manuals for interception software from Hacking Team which shows their three types of Wi-Fi attacks....

What's new with Java

There are three latest versions of Java. Tweaking Java to disable SSL 3.0. Securing Java. Explaining the security messages when running Java applets. Expiring old versions of Java.

SSL,TLS, POODLE, email, Fastmail, Popcorn and me

The POODLE flaw in SSL version 3 also impacts email.

Fallout from the JPMorgan Chase breach

Fallout from the JPMorgan Chase breach

What's the fallout from the Chase bank breach? Phishing of course, but phone calls and snail mail can also be abused. I was targeted by a snail mail billing scam. Most website rating systems fail to warn about the site involved in the...

A router firmware update goes bad

Many people don't upgrade the firmware in their routers. It's dangerous and confusing. When I recently upgraded an Asus router, I experienced the danger firsthand. But, there are ways to protect yourself.

Scammed by EarthLink

Scammed by EarthLink

Out of the blue, EarthLink starts charging a customer for Norton 360 software.

Financial firms not offering two factor authentication

A recent article in the New York Times may, hopefully, shame financial firms into increasing their online security. The article, A Two-Step Plan to Stop Hackers by Ron Lieber is about two factor authentication (2FA), a system we...

Consumer Reports drops the ball on airport Wi-Fi

The September 2014 issue of Consumer Reports has one of their most disappointing articles. It's called "Free Wi-Fi takes off at airports" and is on page 10 (it's not available online). The article is a huge opportunity missed....

The security flaws in Tails Linux are not its only problem

If you want to use Tor, then Tails is your best friend. Tails is a version of Linux that sends data through the Tor network. All Internet traffic to/from Tails goes through Tor, making it resistant to end user mistakes. Tails...

Protecting email at a hacker conference

The upcoming hacker conferences, HOPE, Black Hat and DEFCON make this a good time to think about email security. Rather than end to end security, which requires both the sender and recipient to use the same security software, my...

Comcast XFINITY WiFi: Just say no

About a year ago, Comcast started modifying the routers of some of their customers to create a quasi-public wireless system called XFINITY WiFi intended for use, mainly, by Comcast customers. Home users would see a new Wi-Fi...

Load More
+