What you should really know about every major hacking story

cyber attacks and cyber crime.
You can actually protect yourself against cyber attacks.

The way we talk about cybersecurity is a mess. Even as Russian hackers and ransomware attacks continue to make headlines, the media coverage can’t seem to get past a level of vagueness that invites readers to throw their hands up in frustration. The payback: learned helplessness that stops us from dealing with the problem.

President-elect Donald J. Trump’s erratic public statements — last summer’s invitation to Russia to hack Democratic candidate Hillary Clinton, last fall’s glib debate comments about “the cyber” and his suggestion at last week’s press conference that it was the Democratic National Committee’s fault for getting hacked — haven’t helped.

But this isn’t just Trump’s fault. Mass-media coverage continues to leave readers under-informed about what happened, as well as why and what they should do when a new cyber attack is uncovered.

Sometimes it’s just wrong. The Washington Post first trumpeted a scoop that Russian hackers had breached a Vermont electric utility’s systems, then rushed to correct the story, reporting that Russians weren’t involved and there might not have been any hacking.

All of this can leave readers and listeners feeling confused, disempowered or worse.

We’re not all doomed

In his recent role as cybersecurity commentator, Trump told reporters at a New Year’s Eve party at his Mar-a-Lago estate in Florida that “no computer is safe.” He suggested that if you want information sent securely, you should have a courier hand-deliver it.

The president-elect has company in that view. I see it all the time in comments here when I write about cybersecurity. And computing professionals spend so much time arguing that any one security scheme is fatally flawed that Facebook (FB) chief security officer Alex Stamos calls this nothing-is-safe mindset “security nihilism.”

Trump hasn’t always felt that way about computer security. Last February, he called for a boycott of Apple (AAPL) if it wouldn’t unlock the iPhone used by one of the San Bernardino shooters. Less than two months later, the FBI announced that it had gotten into the phone anyway.

(Bizarre subsequent plot twist: The company reported to have done that work for the FBI, the Israeli firm Cellebrite, itself admitted last week that hackers had breached one of its servers to extract customer data. So you should also suspect claims of bulletproof security.)

Hacks don’t just happen

Stories about hacking incidents too often offer near-zero details on what actually happened. A data breach was discovered, somebody’s email account was compromised, a social-media account was commandeered, ransomware locks up an organization’s system — we’re only told those things took place but not how.