Welcome to the Loose Leaf Security archives, where you can find suggestions for where to get started with Loose Leaf Security, a complete list of our episodes, articles, and resources by topic, a list of all past newsletter issues, and a tag cloud of all tags.
New to Loose Leaf Security and wondering where to get started?
- If you're not currently using a password manager, we'd recommend starting with "Securing your online account passwords" (May 29, 2018) and "Using a password manager effectively" (March 19, 2019). We discuss the value of unique, strong passwords and how you can easily manage them by using a password manager.
- If you've already put your passwords in a password manager, but haven't started using two-factor authentication, check out "Two-factor authentication and account recovery" (June 12, 2018).
- If you're interested in a neat history lesson, listen to "The history of the Web and an introduction to browser security" (July 24, 2018). This episode isn't just about history, though - understanding the web browser security model and its limitations will help you make safer choices while surfing the web.
- If you have a specific topic in mind that isn't on this list, check out the complete list of episodes, articles, and resources we've released by topic below.
Episodes, articles, and resources by topic
Alternatively, see our episodes sorted by release date (most recent first), our articles sorted by release date (most recent first), and our resources page.
Account security
- "Securing your online account passwords" (May 29, 2018), which covers strong passwords and why you should use a password manager
- "Two-factor authentication and account recovery" (June 12, 2018)
- "Using a password manager effectively" (March 20, 2019), which discusses different types of digital password managers and how to get the most out of them, including how to update your passwords after a breach
- "Two-factor tidying" (May 16, 2019), how to stay on top of the wide variety of two-factor methods available for your accounts and tips for keeping track of your second factors with your password manager
- "Password managers: how they should work and when they didn't" (June 27, 2019), which discusses the security records of specific password managers and their extensions - very helpful for choosing a password manager!
- Our password manager reference page, which is handy for sending to your friends who have yet to choose a password manager!
- Our two-factor authentication zine (August 31, 2018), free to print and distribute!
- Our two-factor authentication quick reference page, which is handy for sending to your friends who want to get up to speed on two-factor fast!
- Instagram 'Unusual Login Attempt' verification loop failures (August 9, 2019)
Laptop and desktop computer security
- "Physical attacks to your computers and disk encryption" (October 18, 2018), which includes a discussion of how to securely erase files
- "Backups" (October 30, 2018), the invaluable tool that lets you easily and confidently wipe a compromised computer and get back to work quickly
- "Malware, antivirus, and safe downloads" (November 20, 2018)
- "Built-in dangers: physical ports, OS defaults, and remote access" (December 13, 2018), which covers Thunderbolt and USB threats, bloatware, crash reporting, telemetry, and choosing the right level of remote access
Phone security
- "Securing your phone" (June 26, 2018), an overview of phone security that doesn't get into platform specifics
- "Comparing Android and iOS security" (July 10, 2018), a deep dive into the specific security concerns of the two most popular mobile platforms
Web security
- "The history of the Web and an introduction to browser security" (July 24, 2018)
- "Web security continued: cookies, plugins, and extensions" (August 7, 2018), including unwanted content blockers a.k.a. ad blockers
- "Keeping your web browsing private" (August 21, 2018), which covers HTTPS and private browsing modes
Personal finance
- "Credit and debit card security" (January 29, 2019)
- "Checks, mobile banking, cash transfer apps, and a bit more on credit cards" (February 19, 2019)
Other privacy concerns
Privacy is a really common concern that comes up in nearly all our episodes, but some of our episodes are devoted to specific privacy concerns.
- "Digital photos and privacy" (September 18, 2018)
- "Covering your webcams" (August 22, 2019)
Security stories
Fun stories from our own security adventures and really juicy news stories that weren't quite useful enough for the regular security news segment
- "Security stories: lost phones, a compromised computer, and an unexpected keyboard cat" (September 4, 2018)
- "Security stories: surveillance databases, unlocking apps, unexpected photo booths, and evolving data" (December 25, 2018)
Past newsletter issues
- Loose Leaf Security Weekly, Issue 30 (May 18, 2020)
- Loose Leaf Security Weekly, Issue 29 (April 21, 2020)
- Loose Leaf Security Weekly, Issue 28 (April 5, 2020)
- Loose Leaf Security Weekly, Issue 27 (March 27, 2020)
- Loose Leaf Security Weekly, Issue 26 (March 19, 2020)
- Loose Leaf Security Weekly, Issue 25 (March 10, 2020)
- Loose Leaf Security Weekly, Issue 24 (March 2, 2020)
- Loose Leaf Security Weekly, Issue 23 (February 23, 2020)
- Loose Leaf Security Weekly, Issue 22 (February 17, 2020)
- Loose Leaf Security Weekly, Issue 21 (February 10, 2020)
- Loose Leaf Security Weekly, Issue 20 (February 2, 2020)
- Loose Leaf Security Weekly, Issue 19 (January 27, 2020)
- Loose Leaf Security Weekly, Issue 18 (January 19, 2020)
- Loose Leaf Security Weekly, Issue 17 (January 12, 2020)
- Loose Leaf Security Weekly, Issue 16 (December 22, 2019)
- Loose Leaf Security Weekly, Issue 15 (December 14, 2019)
- Loose Leaf Security Weekly, Issue 14 (December 7, 2019)
- Loose Leaf Security Weekly, Issue 13 (November 28, 2019)
- Loose Leaf Security Weekly, Issue 12 (November 23, 2019)
- Loose Leaf Security Weekly, Issue 11 (November 16, 2019)
- Loose Leaf Security Weekly, Issue 10 (November 8, 2019)
- Loose Leaf Security Weekly, Issue 9 (November 1, 2019)
- Loose Leaf Security Weekly, Issue 8 (October 25, 2019)
- Loose Leaf Security Weekly, Issue 7 (October 17, 2019)
- Loose Leaf Security Weekly, Issue 6 (October 9, 2019)
- Loose Leaf Security Weekly, Issue 5 (October 2, 2019)
- Loose Leaf Security Weekly, Issue 4 (September 24, 2019)
- Loose Leaf Security Weekly, Issue 3 (September 18, 2019)
- Loose Leaf Security Weekly, Issue 2 (September 10, 2019)
- Loose Leaf Security Weekly, Issue 1 (September 3, 2019)
All tags
1Password · account recovery · ad blockers · admin access · Adobe · adversarial fashion · advertising · Alexa · algorithmic bias · algorithms · Amazon · Android · antivirus · app stores · Apple · Apple Card · Apple Pay · associated domains · ASUS · ATMs · AT&T · augmented reality · authentication · authenticator apps · Avast · backups · banking · BGP hijacking · biometric unlocking · BIOS · BitLocker · bloatware · Bluetooth · boot ROM · Border Gateway Protocol · botnets · Brave · breaches · bug bounty · CamScanner · car black box · cars · CCPA · cell phones · Cellebrite · certificate authorities · Certificate Transparency · certificates · charging · checks · Clearview AI · clickjacking · cloud storage · confidence scams · contactless payments · cookies · Corellium · crash reports · credit cards · credit freezes · credit reports · credit scores · CVV · Dashlane · data blocker · data brokers · debit cards · deep learning · deepfakes · defense in depth · denial-of-service attacks · Device Policy · device security · Digital Asset Links · digital cameras · digital photos · disclosure · disk encryption · DMA · DNA · DNS · downloads · drivers · DuckDuckGo · EFAIL · electronic voting · email · Emotet · employer accounts · encryption · end-to-end encryption · Exif · Extended Validation SSL Certificates · extensions · Face ID · Facebook · FaceTime · facial recognition · Fama · FIDO · file encryption · Find My · fingerprinting · fingerprints · Firefox · firmware · Flash · forks · forward secrecy · fraud · fraud alerts · FTC · G Suite · GDPR · GEDmatch · GitHub · Gmail · Google · Google Ads · Google Chrome · Google Drive · Google Home · Google Maps · Google Pay · Google Takeout · government access to private data · government-run databases · GPS · Halloween · hard drives · hardware · health data · Hikvision · history · HTTPS · HTTPS Everywhere · identity theft · iMessage · IMSI catchers · in-app purchases · Instagram · Intelligent Tracking Prevention · Internet Explorer · internet of things · iOS · IP address · iPhone · iTunes · jailbreaking · Java · JavaScript · JPEG · juice-jacking · KeePass · KeePassXC · Keeper · laptops and desktop computers · LastPass · LGBTQIA+ · Lightning cables · Linux · localStorage · location data · lock screen · machine learning · macOS · malvertising · malware · Meltdown · MEMS · metadata · Microsoft Edge · Mint · mixed content · mobile banking · Mobile Device Management · NAS · Nest · Nexus · Niantic · Nintendo · Noonlight · NordVPN · NoScript · notifications · NSO Group · Office macros · old hard drives · OnePlus · online accounts · online dating · open source · origin · passcodes · password managers · passwords · PayPal · Pegasus · permissions · permissions prompts · personal data · personal finance · phishing · phone calls · phone number porting · phone numbers · phones · physical security · PIN · Pixel · plugins · podcast recommendations · police · pop-ups · pre-installed software · principle of least surprise · privacy · Privacy Badger · private browsing · Private Internet Access · Project Treble · QuickBooks Online · RAM · ransomware · RCS · Reddit · remote access · responsible disclosure · Retina-X · Ring · Rubber Ducky · Safari · Safe Browsing · Samsung · Samsung Pay · sandboxing · scams · school surveillance · screen locking · security keys · security questions · security records · sextortion · shared accounts · sideloading · Sidewalk · Signal · SIM cards · SIM-jacking · Simjacker · skimmers · smart TVs · smartphones · SMS · snow boot · social engineering · social media · software updates · Spectre · speculative execution · spyware · Square · SSL · stalkerware · Steam · Super Micro · surveillance · suspicious account activity · T-Mobile · technology-assisted contact tracing · telemetry · Tencent · text messages · theft tracking · third-party access · third-party logins · threat modeling · Thunderbolt · Tinder · TLS · Tor · Touch ID · tracking · transaction notifications · Trend Micro · trust · Twitter · two-factor authentication · U2F · Uber · uBlock origin · ultra-wideband · Untitled Goose Game · USB · USB-C · user-submitted data · Venmo · Veritas Genetics · videoconferencing · Visual Voicemail · VPNs · web browsers · WebAuthn · webcams · WhatsApp · wifi · Windows · Windows Update · wiping data · WWDC · YouTube · YubiKey · Zappos · Zelle · zero-day · zines · ZIP files · Zoom