American - Journalist | November 3, 1960 -
Everyone and his Big Brother wants to log your browsing habits, the better to build a profile of who you are and how you live your life - online and off. Search engine companies offer a benefit in return: more relevant search results. The more they know about you, the better they can tailor information to your needs.
Barton Gellman
LifeLiveBrotherSearchBetterYou
In the field of biological weapons, there is almost no prospect of detecting a pathogen until it has been used in an attack.
UsedAttackBeenAlmostProspect
Suppose a bad guy guesses the password for your throwaway Yahoo address. Now he goes to major banking and commerce sites and looks for an account registered to that email address. When he finds one, he clicks the 'forgot my password' button and a new one is sent - to your compromised email account. Now he's in a position to do you serious harm.
YouBadLooksSeriousNewNow
Smallpox, which spreads by respiration and kills roughly one in three of those infected, took hundreds of millions of lives during a recorded history dating to Pharaonic Egypt. The last case was in 1978, and the disease was declared eradicated on May 8, 1980.
HistoryDatingThreeEgyptMayLast
The first reports of AIDS closely followed the inauguration of President Ronald Reagan, whose 'family values' agenda and alliance with Christian conservatives associated AIDS with deviance and sin.
FamilyChristianValuesSinFirst
One common puzzle for the security-minded is how to work with confidential data on the road. Sometimes you can't bring your laptop, or don't want to. But working on somebody else's machine exposes you to malware and leaves behind all kinds of electronic trails.
WorkRoadPuzzleDataYouSometimes
Some misunderstandings are hard to cure.
HardCureSomeMisunderstandings
A minimum precaution: keep your anti-malware protections up to date, and install security updates for all your software as soon as they arrive.
SecuritySoftwareUpKeepDateYour
Activists and geeks, standing together, are demonstrating powers beyond the reach of government control.
TogetherGovernmentControlReach
The NSA has different reporting requirements for each branch of government and each of its legal authorities.
GovernmentLegalDifferentReporting
Even complex passwords are getting easy to break if they're too short. That's because today's inexpensive computer chips have the power of supercomputers from the year 2000.
TodayPowerShortYearEasyBreak
Privacy and encryption work, but it's too easy to make a mistake that exposes you.
WorkMistakeEasyYouPrivacyMake
Copyright © 2024 QuotesDict Barton Gellman quotes