Tuesday, October 21st, 2014
2-Step Verification offers a strong extra layer of protection for Google Accounts. Once enabled, you’re asked for a verification code from your phone in addition to your password, to prove that it’s really you signing in from an unfamiliar device. Hackers usually work from afar, so this second factor makes ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Thursday, July 31st, 2014
Security researchers have found a fundamental flaw that could affect billions of USB devices. This flaw is so serious that, now that it has been revealed, you probably shouldn’t plug a USB device into your computer ever again. There are no known effective defenses against this variety of USB attack, though ...
Posted in Hardware, Security | No Comments
Wednesday, June 18th, 2014
Ever since I learned about the threat of “juice-jacking” — the possibility that plugging your mobile device into a random power charging station using a USB cord could jeopardize the data on that device — I’ve been more mindful about bringing a proper power-outlet charging adapter on my travels. But in the ...
Posted in Hardware, Mobile, Privacy, Security | No Comments
Friday, January 24th, 2014
A new computer Trojan program attempts to install mobile banking malware on Android devices when they're connected to infected PCs, according to researchers from Symantec.
This method of targeting Android devices is unusual, since mobile attackers prefer social engineering and fake apps hosted on third-party app stores to distribute Android malware.
"We've ...
Posted in Internet, Mobile, Networking, Security, Windows | No Comments
Wednesday, May 29th, 2013
As individuals and organizations digitize more data, they become more susceptible to major data breaches. Though convenient, inexpensive USB flash memory sticks and other portable storage devices certainly don't help the cause, because workers use them transport databases and other confidential information. On top of the real danger of misused ...
Posted in Hardware, Privacy, Security | No Comments
Page 2 of 11«12345...10...»Last »