David Longenecker

Opinions expressed by ICN authors are their own.

I am a Security Specialist with nearly two decades of experience in system administration and architecture, LAN installation and operations, hacking and defending, incident handling, intrusion detection and prevention, risk management, cyber intelligence and threat assessment, and technical team leadership.

Separate from my "day job," I regularly blog about security topics ranging from risk tolerance to authentication, home network security, geotagging, social engineering and identity theft. I take pride in presenting complicated concepts in a clear manner such that the lay person can understand but the advanced technologist can find value.

A common comment I get from friends and family is that complex security topics give them headaches. They want to know in simple terms how to stay safe in a connected world. Folks like me and my peers have chosen to make a profession out of hacking and defending. I've been doing this for the better part of two decades, so I would hope I have a high degree of knowledge in the field. Others have chosen different paths - paths where I would be lost.

I created and write for smallwordsecurity.com, as in security knowledge without all the big words.

The opinions expressed in this blog are those of David Longenecker and do not necessarily represent those of Intel Corporation or IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Does a smartphone make two-factor authentication?

A positive step for insecure home routers

A positive step for insecure home routers

It's gratifying to see real results come out of my research. ASUSTeK has settled a case with the FTC involving the security state of its wireless routers, and among the terms is something I have been seeking for a couple of years:...

Putting the Comcast vulnerability in context

Putting the Comcast vulnerability in context

Recent research showing that Comcast Xfinity home security systems can be abused to falsely report all is well during a break-in have flooded the news this week. Exploitable vulnerabilities are attention-grabbing, but need to be...

Your child's privacy is eroding

Your child's privacy is eroding

Social media, cloud-based educational tools, and Internet-connected toys are eating away at your child's privacy. VTech recently was breached, affecting over 5 million parents and 6.4 million children. Privacy advocates see "Hello...

Back to school cyber tips

Back to school cyber tips

Practical security suggestions that anyone can follow. None of these are earth-shattering - I and my fellow security professionals have recommended most of these for years, though the order of importance has changed a bit recently....

Maybe a Cyber UL is just what we need

Maybe a Cyber UL is just what we need

For over 120 years, Underwriters Laboratories has given manufacturers and developers a trusted way to assure consumers that products are physically safe. Noted hacker "Mudge" is on a mission to do the same for connected products.

Incident response lessons from the Texas flash flood

Incident response lessons from the Texas flash flood

During the overnight hours of Saturday night and Sunday morning May 23-24, heavy rain in the Texas Hill Country triggered a flash flood of near-Biblical proportions in Wimberley and San Marcos. This is the story of a disaster response...

How secure is your email?

How secure is your email?

Encrypted email has long been a complicated problem to solve, but a combination of Internet titans and innovative startups are working to make it practical for real people. Google has an "End-To-End" project developing a plugin for...

Load More