Tag Archives: security

Hands On With Google And Microsoft Authenticator Apps by https://is.gd/74oK1a

One of the primary vehicles used by bad guys to access our systems is stealing log-in credentials in order to impersonate real users. All the security processes and tools in the world are circumvented when someone has your username and password.

That’s where two-factor authentication (2FA) comes into play. 2FA works by adding another authentication challenge to the equation. It’s not just about what you know – your password, it’s also about something you have. That’s where the authenticator apps from Microsoft and Google come into play.

from https://is.gd/74oK1a

Selected by Galigio via Computer Borders

Debian GNU/Linux 9 “Stretch” to Ship with a Bunch of Digital Forensics Tools by https://is.gd/N7DBub

debian-gnu-linux-9-stretch-to-ship-with-a-bunch-of-digital-forensics-tools

Debian developer Michael ‘mika’ Prokop announced today that he’s team over at Debian Forensics will include and maintain a bunch of digital forensics tools, along with their dependencies, in the upcoming Debian GNU/Linux 9 “Stretch” release.

from https://is.gd/N7DBub

Selected by Galigio via Computer Borders

Fake Apps Pose New Phishing Threat by https://is.gd/UsnPS3

Phishing (i.e., fake, malicious email) doesn’t always get a lot of respect. At a time when the world is focused on “zero days,” cyber “weapons” and “kinetic” cyber attacks on the power grid, the very concept of phishing emails seems decidedly old-fashioned, almost second-rate.

In reality, however, phishing continues to pose one of the top threats to businesses and consumers the world over.

from https://is.gd/UsnPS3

Selected by Galigio via Computer Borders

11 year old boy hacks Bluetooth devices using Raspberry Pi by https://is.gd/Iii0q4

An audience of security experts attending a cybersecurity conference at the World Forum in The Hague (The Netherlands) on Tuesday were shocked when a demonstration done by an 11-year-old “cyber ninja” showed the dismal cyber security standards that are prevailing in technology.

from https://is.gd/Iii0q4

Selected by Galigio via Computer Borders

Linux and Other Open Source Technologies Protect Online Privacy: Snowden by https://is.gd/PlAzLb

uqg6rtn

Edward Snowden, the whistleblower who is living in exile since 2013 when he uncovered NSA’s surveillance operations. However, the tech world’s robin hood makes quite a few virtual appearances and gives his views on the state of privacy.

Snowden’s latest Q&A interaction happened with OpenStack Foundation’s COO Mark Collier over a video conference call during the OpenStack Summit. Snowden emphasized that premium cloud platform and proprietary software are a dent on people’s privacy.

from https://is.gd/PlAzLb

Selected by Galigio via Computer Borders

Your smart TV’s privacy policy explained by https://is.gd/csR4Pe

Let’s be honest here — most of us don’t read the privacy policies for smart televisions. And even if we try to, it’s often difficult to read them, particularly on a television screen. Some televisions even display the massive policies five lines at a time.

from https://is.gd/csR4Pe

Selected by Galigio via Computer Borders

What you need to know about the privacy of the new smart camera Amazon wants you to put in your bedroom by https://is.gd/rTqna4

Amazon’s newest version of its Echo smart-home device, the Look, boasts a built-in video camera that can capture your outfits and provide fashion recommendations.

That’s a big step toward a lifestyle of the future.

But it also creates some important privacy issues that are worth keeping in mind if you’re considering buying the $199 Echo Look.

from https://is.gd/rTqna4

Selected by Galigio via Computer Borders