by ray | Mar 15, 2017 | Security, Tech News
Two-factor authentication is one of the best things you can do to make sure your accounts don’t get hacked. We’ve talked about it a bit before, but here’s a list of all the popular services that offer it, and where you should go to turn it on right...
by ray | Mar 14, 2017 | Security, Tech News
A week ago Friday, someone took down numerous popular websites in a massive distributed denial-of-service (DDoS) attack against the domain name provider Dyn. DDoS attacks are neither new nor sophisticated. The attacker sends a massive amount of traffic, causing the...
by ray | Mar 14, 2017 | Security, Tech News
Just months after disclosing a breach that compromised the passwords for a half billion of its users, Yahoo now says a separate incident has jeopardized data from at least a billion more user accounts. The company also warned attackers have figured out a way to log...
by ray | Oct 27, 2016 | Security
IMAGE: FRANK DUENZL/PICTURE-ALLIANCE/DPA/ASSOCIATED PRESS A federal court judge has ordered Apple to assist the FBI with unlocking an iPhone used by one of the attackers responsible for the December mass shooting in San Bernardino, California. Apple, for its part, is...
by ray | Oct 27, 2016 | Google, Google Workspace, Security
Image Credit: Shutterstock / 360b Google’s battle against poor passwords is continuing. The company is now testing a new Google Account option that lets users login using their phone, skipping the part where you have to enter your password. The feature uses your phone...
by ray | Oct 27, 2016 | Security
Vulnerability allows restricted users and apps to gain unfettered root access. For almost three years, millions of servers and smaller devices running Linux have been vulnerable to attacks that allow an unprivileged app or user to gain nearly unfettered root access....