article thumbnail

There’s a better way to protect yourself from hackers and identity thieves

Vox

Authenticator apps like Google Authenticator might seem intimidating, but they’re easy to use and safer than texts. If you’re using texts for two-factor authentication, it’s time to change to an app. When people ask me for security tips, I give them the basics. And you always use two-factor authentication, or 2FA.

article thumbnail

Technology Short Take 176

Scott Lowe

This Tech Short Take is a bit heavy on security-related links, but there’s still some additional content in a number of other areas, so you should be able to find something useful—or at least interesting—in here. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Thanks for reading!

Linux 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland. She is the author of Surveillance or Security? BALTIMORE , Sept.

Security 150
article thumbnail

Microsoft issues fixes for non-supported versions of Windows Server

Network World

Microsoft took the rare step of issuing security fixes for both the server and desktop versions of Windows that are long out of support, so you know this is serious. CVE-2019-0708 is pre-authentication and requires no user interaction, meaning any future malware could self-propagate from one vulnerable machine to another.

Windows 99
article thumbnail

Security attacks and countermeasures

Cloud Musings

Johnson Cyber security is rapidly becoming a significant issue in the C-suite as well as the population at large. The results of Dell’s Global Technology Adoption Index(GTAI) [1] show that security is a top concern for most of the 2000 global small and medium businesses surveyed. by Sandra K. For example, recent breaches include 3.65

Security 159
article thumbnail

Top 10 Data Breaches of All Time

SecureWorld News

What was compromised: real names, email addresses, dates of birth, telephone numbers, and security questions. What was compromised: b ank account numbers, bank statements, mortgage and tax records, social security numbers, wire transaction receipts, and driver license images. Top 10 most significant data breaches. Records affected: 21.5

Data 118
article thumbnail

CloudVelocity Announces $13M Funding, New Tools for AWS.

Data Center Knowledge

More importantly, the One Hybrid Cloud technology adds security features that may make cloud adoption more accessible for enterprise customers with stringent compliance and security requirements. CloudVelocity says more than 100 enterprise trials have conducted trials since the company emerged from stealth in December 2012.

Tools 205