With the advent of Large Language Models (LLMs) and tools like GitHub CoPilot, I think we’re a step closer towards a world where software can be created by anyone...Jason Hong From BLOG@CACM | February 17, 2023 at 03:11 PM
In comic books, most superheroes have a secret identity, usually to protect their friends and family from retribution. However, today’s computer technology would...Jason Hong From BLOG@CACM | January 24, 2022 at 09:12 AM
Why is our community having such an anemic response to all of these major data breaches? What can we do differently? What should we be doing differently?Jason Hong From BLOG@CACM | December 11, 2014 at 09:57 AM
Why has there been so much negative sentiment about Google Glass in the press regarding privacy? This article looks at privacy from two different perspectives,...Jason Hong From BLOG@CACM | August 26, 2013 at 10:28 AM
Why does this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?Jason Hong From BLOG@CACM | February 17, 2012 at 02:23 PM
There's a big mismatch right now between what the data says about computer security vulnerabilities and what kind of research is being done and products offered...Jason Hong From BLOG@CACM | December 15, 2011 at 04:08 PM
At least 9 characters long. No repeated characters. At least 1 number, 1 special character, and 1 capital letter. Cannot be same as last 10 passwords. Must change...Jason Hong From BLOG@CACM | August 23, 2011 at 09:44 AM
We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...Jason Hong From BLOG@CACM | April 27, 2011 at 12:50 PM
Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...Jason Hong From BLOG@CACM | May 11, 2010 at 10:38 AM
Computer security warnings are something we all see everyday, but many people find them annoying and ignore them. What are better ways of designing warnings?Jason Hong From BLOG@CACM | September 30, 2009 at 02:30 PM
I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...Jason Hong From BLOG@CACM | June 22, 2009 at 04:07 PM
One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...Jason Hong From BLOG@CACM | May 18, 2009 at 09:10 AM
How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.Jason Hong From BLOG@CACM | April 22, 2009 at 01:49 PM
Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...Jason Hong From BLOG@CACM | April 22, 2009 at 10:11 AM
When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...Jason Hong From BLOG@CACM | March 18, 2009 at 10:23 AM
I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...Jason Hong From BLOG@CACM | March 5, 2009 at 02:43 PM