Latest articles tagged “security”
Two-Factor Authentication Explained - Protecting Your Accounts With More Than Just a Password
by Chris Thomas
on 31 July 2014
·
19862 views
Two-factor authentication (also commonly referred to as TFA) is a form of identity authentication that requires a user to verify their identity based on at least two identity factors. ... Read more
iOS Backdoors: Apple Denies NSA Affiliation, but the Privacy Is Dead
by Dan Vlasic
on 26 July 2014
·
2276 views
In iOS 7, file_relay has access to 44 data sources, including the ones dealing specifically with users' personal information: accounts, address book, GPS logs, photos, calendar files, notes, call history, maps of the device's file system, voicemail.. ... Read more
Tails OS: Zero-Day Vulnerabilities Allegedly Found. No Proof Provided
by Dan Vlasic
on 24 July 2014
·
1871 views
There is a serious media campaign to discredit popular privacy and security tools - Tor, Tails and TrueCrypt. It doesn't mean there are no vulnerabilities, but facts and proof are very welcome when it comes to serious accusations. ... Read more
Avoid These Android Security Mistakes To Stay Mobile Safe
by Pete Daniel
on 21 July 2014
·
8986 views
With Android smartphone and tablet use, getting the security aspects sorted out is key. You never know when your phone or tablet may be stolen and security compromised, so protecting yourself out of the gate is important to do. ... Read more
Apple Vs. Android – Which Is More Secure?
by Pete Daniel
on 16 July 2014
·
2105 views
Security is a key concern around mobile devices. For individuals and business people, locking down devices so that not much can be gotten out of them should they become lost or stolen is a key consideration. Which platform is more secure? ... Read more
How To Securely Wipe Your Android Device Prior To Sale
by Pete Daniel
on 16 July 2014
·
2049 views
There are two ways to safely dispose of an Android smartphone or tablet. The first is to encrypt the device and return it to “factory reset†settings. The second is by using a utility to wipe the data by writing random information over existing d ... Read more
Android Factory Reset Fails To Delete All Data Safely In Tests
by Pete Daniel
on 16 July 2014
·
1977 views
When disposing of an old smartphone and buying a new one, what is necessary to protect the data on the old phone? We might think that rolling the phone back to the original factory settings would be enouhg. We'd be dead wrong. ... Read more
US Bans Uncharged Laptops and Smartphones from Flights
by Dan Vlasic
on 10 July 2014
·
1869 views
In order to promote aviation security, Homeland Security and the US Transportation Security Administration enhance security procedures on flights to the US, and the new set of rules doesn't allow uncharged and turned off smartphones aboard planes. ... Read more
Tor Might Be Monitored by NSA
by Dan Vlasic
on 7 July 2014
·
2913 views
Trying to avoid censorship, access websites for adults, contact your source for another big article, or protect your location from an abusive partner? NSA has you marked, analyzed and labeled. ... Read more
Malwarebytes Releases Anti-Exploit Free & Premium from Beta
by Pete Daniel
on 4 July 2014
·
2180 views
Malwarebytes is digging deeper than their previous software offerings by looking for ways to offer more. Malwarebytes Anti-Exploit is their answer to the risks of modern applications running within Windows being weak points for hackers. ... Read more
BitCoin Buyers Annoyed At US Government For Leaking List of Potential Bidders
by Pete Daniel
on 4 July 2014
·
1887 views
In what is becoming an all too common occurrence in the news headlines, private data was issued by mistake recently by the U. S. Marshall Service (USMS) who setup a BitCoin auction. ... Read more
Top File Erasing Software for Windows
by Dan Vlasic
on 3 July 2014
·
3621 views
To really delete the files, or shred them, you need to use special software that overwrites the data multiple times using specific algorithms, rendering the data unrecoverable. ... Read more
Kill Switch May Finally Come to the U.S. Consumers
by Dan Vlasic
on 2 July 2014
·
2839 views
If you run the misfortune of having your smartphone stolen, you can lock the device remotely by calling the wireless carrier or navigating to a specific website to send your device command to kill your private data or simply lock your device. ... Read more
German Government Cancels its Contracts with Verizon During Security Overhaul
by Chris Thomas
on 1 July 2014
·
2103 views
This week the Interior Ministry of the German government canceled its contract with Verizon Wireless as part of an overall overhaul of its internal communications infrastructure. ... Read more
Stay Connected
Follow us to get the latest tech tutorials, news, and giveaways as soon as we post them.
Have a Tech Question or News Tip?
Featured Articles
Popular This Week
#news #windows #android #games #ios #how tos #review #best apps #security #google #windows 10 #free #microsoft #apple #windows 8 #apps #chrome #pc #best games #mac #ps4 #smartphone #answers #iphone #samsung #facebook #update #firefox #xbox one #xbox