Latest articles tagged “security”

Latest articles tagged “security”

Showing: 196-210 of 260
Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
by Chris Thomas on 31 July 2014 · 19913 views
Two-factor authentication (also commonly referred to as TFA) is a form of identity authentication that requires a user to verify their identity based on at least two identity factors. ... Read more
iOS Backdoors: Apple Denies NSA Affiliation, but the Privacy Is Dead
by Dan Vlasic on 26 July 2014 · 2290 views
In iOS 7, file_relay has access to 44 data sources, including the ones dealing specifically with users' personal information: accounts, address book, GPS logs, photos, calendar files, notes, call history, maps of the device's file system, voicemail.. ... Read more
Tails OS: Zero-Day Vulnerabilities Allegedly Found. No Proof Provided
by Dan Vlasic on 24 July 2014 · 1886 views
There is a serious media campaign to discredit popular privacy and security tools - Tor, Tails and TrueCrypt. It doesn't mean there are no vulnerabilities, but facts and proof are very welcome when it comes to serious accusations. ... Read more
Avoid These Android Security Mistakes To Stay Mobile Safe
by Pete Daniel on 21 July 2014 · 8999 views
With Android smartphone and tablet use, getting the security aspects sorted out is key. You never know when your phone or tablet may be stolen and security compromised, so protecting yourself out of the gate is important to do. ... Read more
Apple Vs. Android – Which Is More Secure?
by Pete Daniel on 16 July 2014 · 2122 views
Security is a key concern around mobile devices. For individuals and business people, locking down devices so that not much can be gotten out of them should they become lost or stolen is a key consideration. Which platform is more secure? ... Read more
How To Securely Wipe Your Android Device Prior To Sale
by Pete Daniel on 16 July 2014 · 2061 views
There are two ways to safely dispose of an Android smartphone or tablet. The first is to encrypt the device and return it to “factory reset” settings. The second is by using a utility to wipe the data by writing random information over existing d ... Read more
Android Factory Reset Fails To Delete All Data Safely In Tests
by Pete Daniel on 16 July 2014 · 1990 views
When disposing of an old smartphone and buying a new one, what is necessary to protect the data on the old phone? We might think that rolling the phone back to the original factory settings would be enouhg. We'd be dead wrong. ... Read more
China: iPhone is Threat to National Security
by Dan Vlasic on 13 July 2014 · 1835 views
One of the main Chinese broadcasters labeled iPhone as a threat to national security. ... Read more
US Bans Uncharged Laptops and Smartphones from Flights
by Dan Vlasic on 10 July 2014 · 1881 views
In order to promote aviation security, Homeland Security and the US Transportation Security Administration enhance security procedures on flights to the US, and the new set of rules doesn't allow uncharged and turned off smartphones aboard planes. ... Read more
Tor Might Be Monitored by NSA
by Dan Vlasic on 7 July 2014 · 2950 views
Trying to avoid censorship, access websites for adults, contact your source for another big article, or protect your location from an abusive partner? NSA has you marked, analyzed and labeled. ... Read more
Malwarebytes Releases Anti-Exploit Free & Premium from Beta
by Pete Daniel on 4 July 2014 · 2193 views
Malwarebytes is digging deeper than their previous software offerings by looking for ways to offer more. Malwarebytes Anti-Exploit is their answer to the risks of modern applications running within Windows being weak points for hackers. ... Read more
BitCoin Buyers Annoyed At US Government For Leaking List of Potential Bidders
by Pete Daniel on 4 July 2014 · 1902 views
In what is becoming an all too common occurrence in the news headlines, private data was issued by mistake recently by the U. S. Marshall Service (USMS) who setup a BitCoin auction. ... Read more
Top File Erasing Software for Windows
by Dan Vlasic on 3 July 2014 · 3639 views
To really delete the files, or shred them, you need to use special software that overwrites the data multiple times using specific algorithms, rendering the data unrecoverable. ... Read more
Kill Switch May Finally Come to the U.S. Consumers
by Dan Vlasic on 2 July 2014 · 2858 views
If you run the misfortune of having your smartphone stolen, you can lock the device remotely by calling the wireless carrier or navigating to a specific website to send your device command to kill your private data or simply lock your device. ... Read more
German Government Cancels its Contracts with Verizon During Security Overhaul
by Chris Thomas on 1 July 2014 · 2117 views
This week the Interior Ministry of the German government canceled its contract with Verizon Wireless as part of an overall overhaul of its internal communications infrastructure. ... Read more
Showing: 196-210 of 260
Featured Articles