Posts Tagged ‘two factor authentication’

LinkedIn hack sheds light on inherent weakness of passwords

0

Posted on 8th Jun 2012 by in Enterprise

Earlier this week, amidst reports that more than 6.5 million passwords may have been compromised in a hack of a LinkedIn database, I received several calls and emails from friends and family that feared the worst of their LinkedIn accounts, especially after LinkedIn’s Vicente Silveira took to the company’s blog to confirm the reports. Silveira […]

Apple Mac users beware – charting the unknown waters of malware

0

Posted on 18th May 2012 by in Enterprise

As a PC user who converted for a short time to Mac and came back to PC, I’m used to hearing the comments from Apple enthusiasts about the superior security and lack of virus threats on the Mac OS system.  I took some heat for my decision to return to a PC from my Mac […]

What does our future identity look like?

0

Posted on 14th Mar 2012 by in Corporate

Facebook and Google have been under the spotlight recently for the way they deal with online identities. These are just some of the most high profile examples, but have helped drive heightened awareness of our online identities and privacy settings. This week’s SXSWi is understandably awash with debates about what the future might look like […]

CES 2012: Intel launches ultrabook with NFC

0

Posted on 10th Jan 2012 by in Corporate

If you were on Twitter on 9th January during CES 2012 at the time of the Intel press conference you would have seen the Twittersphere explode following the unveiling of Intel’s new ultrabook. That wasn’t the reason for all the tweets, however swanky the ultrabook looks and feels. The reason, in my view, is that […]

Thoughts on Google’s Two-Factor Authentication – Part One

1

Posted on 8th Nov 2011 by in Enterprise

I read an interesting post by Chris Ripley on BlogCritics last week, looking at Google’s two-factor authentication. In case you missed its recent announcement, the search giant has made two-factor authentication available on its email accounts worldwide. This is a great step in the right direction and it’s fantastic to see people like Chris supporting the […]

Is Email our Weakest Link?

0

Posted on 27th Sep 2011 by in Enterprise

Fahmida Y. Rashid’s recent article on email being the main source of data leaks in organizations shines a light on how dependent all professionals have become on email, and how dangerous this could prove to be. It’s all too easy to forward work emails to yourself, or to friends or colleagues, with attachments containing sensitive […]

How to use your mobile authentication

0

Posted on 12th Sep 2011 by in Telecom

Mobile phones are fast moving beyond communications, beyond gaming, social and productivity tools, to take on a vast number of new applications thanks to the use of NFC-based technology and data services. We’re theoretically able to unlock hotel rooms, pay for groceries, secure deals with location-based vouchers and work on the go. We can do […]

Are we seeing the death of the password?

6

Posted on 5th Sep 2011 by in Enterprise

Joey Muniz (The Security Blogger) wrote recently about how it is becoming increasingly straightforward for potential hackers to find out your passwords, due to the predictable nature of way people select a password. This useful cartoon from xkcd shows how easy it can be to obtain passwords, also suggesting a simple way in which to […]

SpyEye targets security blindspots

0

Posted on 1st Sep 2011 by in Enterprise

According to this article from USA Today last week, cyber-attacks are set to increase over the remainder of this year due to the widespread availability of a new SpyEye hacker toolkit. The software allows hackers or cybercriminals to control a network of up to thousands of botnets, which can then be used for spamming, DDOS […]

Why use secure eBanking devices?

0

Posted on 1st Sep 2011 by in Corporate

Using secure eBanking devices reduces online fraud because a hacker cannot access (or take) money from your online banking accounts using only your stolen login information. The hacker would also need the device, a smart bankcard and reader or a secure USB token. Still not convinced you should use secure eBanking devices? Read on!