article thumbnail

Stop using your phone number to log in

Vox

Even things that those services might recommend as an added security measure — like text, SMS, or multi-factor authentication — can actually introduce more vulnerabilities. Anyone whose identity has been stolen can tell you that this Social Security number system isn’t perfect. Use an authenticator app or hardware key instead.

article thumbnail

29 Entrepreneurs Explain How They Came Up With Their Business Name

Computer Weekly

It was late 2006 and I was serving old media as a national editor at an entertainment industry trade publication, plus freelancing for an alt-weekly and writing a book. After weeks of stalking social media and domain names (and with the help of my boyfriend who used the word ‘prose’ nonchalantly in a sentence one evening) a name was born.

Media 203
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to make Facebook secure for organizational use: no more excuses! - Trends in the Living Networks

Trends in the Living Networks

Worklight has just released a Facebook application called Workbook , reports Dan Farber , which authenticates users with an organization’s identity systems, and enables closed communication within the Workbook application between Facebook users. The same thing is happening with social networks. So the excuses are running out.

Trends 60
article thumbnail

Top 5 Reasons Why Agile Development Spurs Innovation

Social, Agile and Transformation

Social, Agile, and Transformation. I cover topics for Technologists from CIOs to Developers - agile development, agile portfolio management, leadership, business intelligence, big data, startups, social networking, SaaS, content management, media, enterprise 2.0 Social, Agile, Transformation Pages. social media. (3).

Agile 105
article thumbnail

Fountainhead: A Leading Indicator of "Consumerized IT"?

Fountainhead

Also, users (students) without their own personal "smart" devices will typically log into multiple alternative devices a number of times each day, requiring virtual display and authentication technologies. ► 2006. (2). What that high school IT department is facing is what most IT will be facing during the next few years.

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

So we include other telemetry that seeks to authenticate that the entity logging in is who they say they are. Without a basic ability to authenticate these characters, there’d be no drama, no romance, no tragedy. So that’s why you need multi factor authentication. Think about it. And important.

article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates

Sean Daniel

Certificates provide two purposes: Authenticating the server to the client Providing encryption between the server and the client I will cover the authenticating the server to the client in this part 1 post, and will write a part 2 post that handles the second part of encryption. Social Media. ► 2006. (63).

Windows 45