What is Two-Factor Authentication? Where Should You Use It?
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
664 articles
Enabling two-factor authentication makes it significantly harder for an attacker to compromise your online accounts, but what is it and when should you use it?
There was a lot of interesting news about hackers and other cybercriminals, so let’s see who has been busted in May.
Feds take down the Gameover botnet, there’s more trouble for OpenSSL, Google publishes data on global Gmail encryption, and Edward Snowden’s first NSA revelation came out one year ago.
Data breaches seemed to dominate the security news in May, but mobile ransomware emerged as well and there was good and bad privacy news from the tech giants.
May 2014 appears to be very stormy and volatile in regards to information security. Still overshadowed by Heartbleed and Windows XP “official demise” from April, it has brought a lot of troubles on its own.
Teaching your child the essential codes of conduct on the Internet is as important as teaching them road safety.
A brief video tutorial on how to enable a number of important security and privacy features built into Google’s Gmail service.
New facts and figures on our partnership with Ferrari.
The season seems to be open: The dust hasn’t yet settled after the Heartbleed semi-apocalyptic revelation, and now eBay has confirmed that its security had been badly breached, with service
Device loss remains among the most serious cyber-threats to consumers. Here are a few tips to avoid losing your favorite gadgets.
What Facebook habits make you vulnerable and how to avoid them.
Bitly was compromised this week and is urging users to change passwords. Point-of-sale systems are poorly secured. And fixes from Microsoft on Patch Tuesday.
Habits are easy to form and hard to break in all facets of life, including technology usage. Sometimes a user’s habits may not seem so harmful, at least from their
So, you may have heard that antivirus has been pronounced dead – again. It has happened before and, no doubt, will happen again. Usually, such “big” announcements are used when
April brought with it some of the biggest security news any of us have seen in quite some time. If you missed any of our coverage or any of our posts from the month, it’s time to catch up now!
A series of security tips and guidelines to follow if you are planning to conduct money transfers online.
Last week, we had a look at private messengers; today, we decided to compile a list of good apps to protect you, your iPhone and its content.
We put too much trust in the Internet. And we need to understand that security products and solutions should compliment a secure mindset.
There is a serious flaw called Heartbleed in OpenSSL encryption library that could expose user login credentials, communications content, an more
On October 25, 2001 Microsoft launched its newest operating system solution: Windows XP. In just three days, Microsoft sold over 300,000 boxed XPs: the new OS featured a number of
We begin our synopsis of this week by looking forward to next week when Microsoft will – at long last – discontinue its support of the once ubiquitous, forever vulnerable,