Author: ByteMe

  • A Must-Read for Parents of Gen Z and Gen Alpha: “The Anxious Generation” by Jonathan Haidt

    A Must-Read for Parents of Gen Z and Gen Alpha: “The Anxious Generation” by Jonathan Haidt

    As a parent, it’s natural to be concerned about the impact of social media on our children. In recent years, we’ve seen an alarming rise in anxiety, depression, and other mental health issues among young people. That’s why I was excited to dive into “The Anxious Generation” by Jonathan Haidt, a thought-provoking book that sheds light on this critical issue.

    I really enjoyed reading this book, which offers a comprehensive analysis of how social media is affecting our children’s lives and the world at large. As someone who values play-based childhoods and more independence for kids, I found myself nodding in agreement with Haidt’s arguments throughout the book. Although, I’m not always the best at executing these principles in my own children.

    One of the most compelling aspects of “The Anxious Generation” is its accessibility. Written in an approachable tone, Haidt breaks down complex concepts into easy-to-understand language, making it a must-read for parents and caregivers alike. The author’s passion for this topic shines through on every page, inspiring readers to take action.

    What I appreciated most about the book was how Haidt tackles tough topics like social media addiction, pornography, and the impact of technology on relationships. He offers practical advice for parents, educators, employers, and policymakers on how to mitigate these effects and promote healthier habits among young people.

    As a parent of Gen Z or Alpha children, I highly recommend “The Anxious Generation” as an essential read. It’s not just a book – it’s a call to action. By speaking up and supporting the four foundational reforms outlined in the book, we can create a better future for our children. Haidt encourages readers to connect with others who share their values, creating a powerful movement that will inspire positive change.

    If you’re looking for a thought-provoking read that will make you think about your role as a parent and how you can support your child’s well-being in the digital age, “The Anxious Generation” is an excellent choice. Sign up at www.afterbabel.com to access Haidt’s Substack posts on related topics and join the conversation.

    Rating: 4.5/5 stars

    I highly recommend this book to anyone concerned about the impact of social media on our children’s lives. It’s a must-read for parents, educators, policymakers, and anyone who wants to make a difference in creating a healthier digital landscape for future generations.

  • Decoding the 2025 Cybersecurity Executive Order: What Every Tech Professional Needs to Know

    I’m excited to share my thoughts on the latest Executive Order signed by the President today, January 16, 2025. This order, titled “Strengthening and Promoting Innovation in the Nation’s Cybersecurity,” marks a significant step forward in our national cybersecurity strategy.

    If you would prefer to listen here is an overview provide by NotebookLM:

    Key Points of the Executive Order

    Enhanced Public-Private Partnerships
    The order emphasizes the critical need for stronger collaboration between government agencies and private sector entities. This approach recognizes that cybersecurity is a shared responsibility and that the most effective defense strategies leverage the strengths of both sectors.

    Investment in Emerging Technologies
    A major focus of this order is the promotion of innovation in cybersecurity. It calls for increased investment in cutting-edge technologies such as artificial intelligence, quantum computing, and advanced encryption methods. These technologies have the potential to revolutionize our cyber defense capabilities.

    Workforce Development
    Recognizing the ongoing shortage of cybersecurity professionals, the order outlines initiatives to bolster education and training programs. This includes expanding scholarship opportunities and creating more pathways for individuals to enter the cybersecurity field.

    Supply Chain Security
    The order addresses the critical issue of supply chain vulnerabilities, which have been exploited in several high-profile attacks in recent years. It mandates stricter security standards for software and hardware used in critical infrastructure and government systems.

    Implications for Cybersecurity Professionals

    As cybersecurity enthusiasts, this Executive Order should be seen as a positive development. It demonstrates a commitment at the highest levels of government to addressing the evolving cyber threats we face. The focus on innovation and emerging technologies aligns with the direction many of us in the field have been advocating for years.

    The emphasis on workforce development is particularly encouraging. It acknowledges the need for a larger and more diverse pool of cybersecurity talent, which is crucial for meeting the challenges of an increasingly complex threat landscape.

    Challenges and Opportunities

    While the order sets ambitious goals, implementation will be key. We should expect to see new initiatives and funding opportunities in the coming months. For those in the cybersecurity field, this presents exciting opportunities for research, innovation, and career advancement.

    However, we must also be prepared for the challenges that come with rapid technological change. As we adopt new technologies and strategies, we’ll need to remain vigilant and adaptable.

    In conclusion, this Executive Order represents a significant step forward in our national cybersecurity posture. It aligns with the realities of the current threat landscape and sets a course for a more secure digital future. As cybersecurity professionals and enthusiasts, we have a crucial role to play in turning these directives into reality.

  • TryHackMe | Advent of Cyber 2024 – Day 24

    Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.

  • TryHackMe | Advent of Cyber 2024 – Day 23

    Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.

  • TryHackMe | Advent of Cyber 2024 – Day 22

    Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.

  • TryHackMe | Advent of Cyber 2024 – Day 21

    Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.

  • TryHackMe | Advent of Cyber 2024 – Day 20

    Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.

  • TryHackMe | Advent of Cyber 2024 – Day 19

    Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.

  • PRC-linked Cyber Espionage: Protecting Your Mobile Communications

    The Cybersecurity and Infrastructure Security Agency (CISA) recently released guidance on best practices for securing mobile communications. This comes in response to identified cyber espionage activity by actors linked to the People’s Republic of China (PRC) government. These actors are targeting commercial telecommunications infrastructure to steal call records and compromise communications of high-profile individuals, such as those in senior government or political positions.

    If you would rather listed to an AI generated podcast summarizing the findings you can find that here:

    While anyone can benefit from implementing these best practices, CISA specifically urges highly targeted individuals to immediately review and apply these measures. It’s important to understand that all communication between mobile devices and internet services is potentially at risk. This includes both government-issued and personal devices.

    Key Recommendations for Everyone

    The guidance emphasizes several key best practices for enhancing mobile security:

    1. Prioritize End-to-End Encrypted Communication:

    • Adopt messaging apps like Signal that guarantee end-to-end encryption for secure communication. This provides a layer of protection against interception.

    2. Enable Phishing-Resistant Authentication:

    • Utilize FIDO (Fast Identity Online) for the strongest form of multifactor authentication (MFA). Hardware-based FIDO security keys like Yubico or Google Titan are most effective, with FIDO passkeys being an acceptable alternative.
    • Take inventory of valuable accounts (email, social media) and enroll them in FIDO-based authentication. Prioritize accounts like Microsoft, Apple, and Google. Disable less secure forms of MFA once FIDO is enabled.
    • Gmail users should enroll in Google’s Advanced Protection Program (APP) for enhanced protection against phishing and account hijacking.

    3. Move Away from SMS-Based MFA:

    • Avoid using SMS for authentication, as messages are not encrypted and can be intercepted.
    • Use authenticator apps like Google Authenticator, Microsoft Authenticator, or Authy for less important accounts, but remember that they are still vulnerable to phishing.
    • Disable SMS for each account once enrolled in authenticator-based MFA to eliminate this exploitable fallback mechanism.

    4. Employ a Password Manager:

    • Utilize password managers such as Apple Passwords, LastPass, 1Password, or others to securely store and manage passwords. Many offer features like weak password alerts and authenticator code generation.
    • Protect your password manager’s primary password with a strong, unique passphrase and ensure all stored passwords are also strong, unique, and random.

    5. Set a Telco PIN:

    • Enable an additional PIN or passcode for your mobile phone account with your telecom provider. This adds a layer of security against SIM swapping attacks.
    • Combine this with MFA on your mobile carrier account and update your account password using a password manager.

    6. Update Software Regularly:

    • Keep mobile device operating systems and applications updated. Enable automatic updates for timely patching.

    7. Use the Latest Hardware:

    • Opt for newer phone models that support the latest security features.

    8. Avoid Personal VPNs:

    • Personal VPN services can increase your attack surface by shifting risk to the VPN provider. Many also have questionable security and privacy policies.

    Device-Specific Recommendations

    In addition to the general recommendations, the guidance offers specific advice for iPhone and Android users:

    iPhone:

    • Enable Lockdown Mode: This feature restricts certain apps, websites, and features to reduce your attack surface.
    • Disable “Send as Text Message” in Message Settings: This ensures messages are only sent via iMessage, which offers end-to-end encryption between Apple users.
    • Protect DNS Queries: Use encrypted DNS services like Cloudflare’s 1.1.1.1 Resolver, Google’s 8.8.8.8 Resolver, or Quad9’s 9.9.9.9 Resolver.
    • Enroll in Apple iCloud Private Relay: This service enhances privacy and security by masking IP addresses and using secure DNS.
    • Review and Restrict App Permissions: Regularly review and limit app access to sensitive data like location, camera, and microphone.

    Android:

    • Prioritize Secure Phone Models: Choose models from manufacturers with strong security track records and long-term security update commitments. Look for devices that offer hardware-level security features and commit to at least five years of security updates.
    • Use RCS Only with End-to-End Encryption: Ensure end-to-end encryption is active when using Rich Communication Services.
    • Configure Android Private DNS: Use trusted, high-privacy DNS resolvers like those mentioned above for iPhone.
    • Enable “Always Use Secure Connections” in Chrome: Ensure all website connections default to HTTPS for increased security.
    • Enable Enhanced Safe Browsing Protection in Chrome: This provides an additional layer of security against malicious websites and downloads.
    • Confirm Google Play Protect is Enabled: This feature detects and prevents malicious apps. Exercise caution when using third-party app stores.
    • Review and Restrict App Permissions: Minimize the access apps have to sensitive permissions like location, camera, or microphone.

    By following these recommendations, you can significantly enhance the security of your mobile communications and protect yourself against the evolving threats posed by state-sponsored actors and other cybercriminals.

  • TryHackMe | Advent of Cyber 2024 – Day 18

    Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.