Home Authors Posts by Carey Parker

Carey Parker

Carey Parker began programming computers in middle school when personal computers were just starting to become popular. For years, these twin interests percolated until he attended Purdue University and he learned you could get paid to do this stuff – it was called Electrical Engineering! After obtaining a bachelor’s and a master’s degree in EE, Carey wrote software for multiple companies, large and small. In recent years, particularly after the Edward Snowden revelations in 2013, he became deeply concerned about computer security and privacy. In 2014, he combined his passion for computers, cybersecurity and fantasy novels with the long-time desire to write the book: Firewalls Don’t Stop Dragons.

🎧 Equifax Breach, Here’s What You Need to Do

Equifax, one of the three major credit bureaus, was hacked - over 143 million U.S. accounts may have been leaked, making them much more...

🎧 If You Aren’t Backing Up, Your Data is on Borrowed Time

Do you have backup copies of all your family photos and home videos? What about your tax documents and other financial data? Maybe you...

🎧 Your Privacy Rights Are Under Assault at the U.S. Border

There are bills before Congress to use drones along our border for mass surveillance and provisions to capturing all manner of biometric data when...

🎧 How to Live in the Era of Fake News

Jeffrey Ritter, author of “Achieving Digital Trust”, is back to help us understand the phenomenon of “fake news” and to explain why it’s not...
Hackers Crack Safes, Teslas, Car Washes and Voting Machines

🎧 Hackers Crack Safes, Teslas, Car Washes and Voting Machines

Chris Romeo regales us with tales of safe-cracking robots, demonic car washes, possessed Teslas, and hacking of voting machines! Where did this all happen?...
Why I Killed my Company to Save my Customers, pt 2

🎧 Why I Killed my Company to Save my Customers, pt 2

In this final segment, we address the classic conundrum: law enforcement believes that your servers hold key information that would prevent a devastating terror...
Why I Killed my Company to Save my Customers

🎧 Why I Killed my Company to Save my Customers

Ladar Levison is the CEO and Founder of Lavabit - a secure email service whose most famous customer was Edward Snowden. In part one...
Achieving Trust in the Digital Age 2

🎧 Achieving Trust in the Digital Age

Is trust just an emotion or is it more than that? In this week’s episode, I speak at length with Jeffrey Ritter: a lawyer,...
How To Hack An Election

🎧 How To Hack An Election

What could be more crucial to a democracy than a voting system we can trust? Today I speak with Barbara Simons, President of VerifiedVoting.org,...
Creating and Remembering Killer Passwords 1

🎧 Creating and Remembering Killer Passwords

Passwords are the bane of our modern existence. Why the hell haven’t we figured out a better way to prove who we are? Today...
NotPetya Malware Strikes, Everything You Need to Know

🎧 NotPetya Malware Strikes, Everything You Need to Know

Lawrence Abrams is the creator and CEO of Bleeping Computer, and he and I delve into the latest malware sweeping the globe called NotPetya...
Don’t Tread on My Bits: Why Net Neutrality Matters

Don’t Tread on My Bits: Why Net Neutrality Matters

Are you ready for the next YouTube, Netflix or Hulu? Then you need to fight to save net neutrality. Today I discuss the threatened...
If You Use Public WiFi At The Hotel, Airport, Coffee Shop....

🎧 If You Use Public WiFi At The Hotel, Airport, Coffee Shop….

If you use public WiFi of any sort at the hotel, airport, or coffee shop (AND WHO DOESN'T), then you need to pay attention....
The Feds Plan For Cars That Can Track & Tattle On You

🎧 The Feds Plan For Cars That Can Track & Tattle On You

The Internet of Things will soon include cars... what could possibly go wrong? If all the cars on the road could tell each other...
How Dumb Are Your 'Smart Devices'?

🎧 How Dumb Are Your ‘Smart Devices’?

Do you have a “smart” TV? Or an Internet-connected baby monitor? Then you are a part of the Internet of Things (IoT)! Welcome to...
Cyber Travel Tips: What To Know Before You Go

🎧 Cyber Travel Tips: What To Know Before You Go

Summer is upon us and for many of us that means travel - but before you even pack your bags, you need to listen...
Learn These WannaCry Lessons Before Round 2 Hits

🎧 Learn These WannaCry Lessons Before Round 2 Hits

The WannaCry virus hit over 200,000 computers in over 150 countries in a matter of days. While WannaCry spread quickly, it had some fatal...
Inoculating the World Against Malware

🎧 Inoculating the World Against Malware

The WannaCry ransomware worm spread across the planet is a matter of hours, infecting over 200,000 computers in just a matter of hours -...
Intel Closes a Nine-Year Backdoor

🎧 Intel Closes a Nine-Year Backdoor

This week I’ll tell you why you should not be using Microsoft’s Edge Browser, how to find out if you were bitten by a...
Your Email is as Vulnerable as Sending a Postcard

🎧 Your Email is as Vulnerable as Sending a Postcard

Would you write banking information, passwords, private conversation or any sensitive data on the back of a postcard? Sounds like a silly question perhaps -...
When the Hackers Become the Hacked

🎧 When the Hackers Become the Hacked

The Shadow Brokers have dumped a treasure trove of NSA secret hacking tools, proving that even the best secret-keepers in the country can’t always...
How to Pick The Only Password You’ll Ever Need

🎧 How to Pick The Only Password You’ll Ever Need

This week I talk with Chris Romeo on why humans are so horribly bad at picking good passwords and why this invariably makes you...
Congress Just Sold You Out (Again)

🎧 Congress Just Sold You Out (Again)

This week I discuss the stunning repeal of Internet privacy provisions with Ernesto Falcon from the Electronic Frontier Foundation. Congress narrowly passed a bill...
Protecting Your Privacy at the US Border

🎧 Protecting Your Privacy at the US Border

What are your rights at the border? It depends on your immigration status, and even US citizens will not enjoy their usual Constitutional rights...
Masking Your Digital Footprints

🎧 Masking Your Digital Footprints

WikiLeaks dumped almost 9000 pages of secret CIA documents on the web for all to see, detailing dozens of secret hacking tools and techniques....
How The Bad Guys Trick You Into Taking Their Bait

🎧 How The Bad Guys Trick You Into Taking Their Bait

“Phishing” is one of the most common and most effective ways for the bad guys to get your passwords or credit card information. In...
Why CloudBleed Wasn’t So Bloody Scary

🎧 Why CloudBleed Wasn’t So Bloody Scary

The media was once again telling everyone to light their hair on fire over the latest web bug that threatens to expose all of...