Posted on 08 June 2012 by Thales DIS
Earlier this week, amidst reports that more than 6.5 million passwords may have been compromised in a hack of a LinkedIn database, I received several calls and emails from friends and family that feared the worst of their LinkedIn accounts, especially after LinkedIn’s Vicente Silveira took to the company’s blog to confirm the reports. Silveira […]
Posted on 18 May 2012 by Jennifer Dean
As a PC user who converted for a short time to Mac and came back to PC, I’m used to hearing the comments from Apple enthusiasts about the superior security and lack of virus threats on the Mac OS system. I took some heat for my decision to return to a PC from my Mac […]
Posted on 14 March 2012 by Thales DIS
Facebook and Google have been under the spotlight recently for the way they deal with online identities. These are just some of the most high profile examples, but have helped drive heightened awareness of our online identities and privacy settings. This week’s SXSWi is understandably awash with debates about what the future might look like […]
Posted on 08 November 2011 by Thales DIS
I read an interesting post by Chris Ripley on BlogCritics last week, looking at Google’s two-factor authentication. In case you missed its recent announcement, the search giant has made two-factor authentication available on its email accounts worldwide. This is a great step in the right direction and it’s fantastic to see people like Chris supporting the […]
Posted on 27 September 2011 by Thales DIS
Fahmida Y. Rashid’s recent article on email being the main source of data leaks in organizations shines a light on how dependent all professionals have become on email, and how dangerous this could prove to be. It’s all too easy to forward work emails to yourself, or to friends or colleagues, with attachments containing sensitive […]
Posted on 12 September 2011 by Thales DIS
Mobile phones are fast moving beyond communications, beyond gaming, social and productivity tools, to take on a vast number of new applications thanks to the use of NFC-based technology and data services. We’re theoretically able to unlock hotel rooms, pay for groceries, secure deals with location-based vouchers and work on the go. We can do […]