by ray | May 6, 2020 | Cloud Tools, Security, Tech News
Source: Zoom What you need to know The Indian government has issued an advisory to its employees, declaring the app ‘unsafe.’Another government report also warned of significant weakness in the app that made it vulnerable to cyber-attacks.This follows...
by ray | May 6, 2020 | Security, Tech News
Dropbox privately paid top hackers to find bugs in software by the videoconferencing company Zoom, then pressed it to fix them. From a report: One year ago, two Australian hackers found themselves on an eight-hour flight to Singapore to attend a live hacking...
by ray | Apr 28, 2020 | Google, Cloud Tools, General News, Security, Tech News
LEON NEAL/AFP Standard Chartered is reportedly the first major global bank to instruct employees not to use the Zoom video conferencing app or Google Hangouts during the Wuhan coronavirus pandemic due to cybersecurity concerns. Reuters reports that Standard...
by ray | Apr 27, 2020 | Security, Tech News
ProtonMailImage Credit: Paul Sawers / VentureBeat **This article was updated on March 16, 2020, to reflect additional input from Proton, which told VentureBeat that it would only use Google’s infrastructure in very limited situations — and that it won’t be...
by ray | Nov 8, 2019 | Security, Cloud Tools, Tech News
Who loves dealing with passwords? No one, that’s who. Making them, remembering them, having to create a new one when they expire and all you want to do is log in. Then there’s the dreaded breach-of-the-week, whern we find out about the latest...
by ray | Oct 8, 2019 | Amazon Web Services (AWS), Amazon, ITAR, Security
Lock Away Your AWS Account Root User Access Keys You use an access key (an access key ID and secret access key) to make programmatic requests to AWS. However, do not use your AWS account root user access key. The access key for your AWS account root user gives full...