Google has announced 2-Step Verification using a USB Security Key. But what is 2-Step verification and should more people use it?
He will also be expelled from the country upon his release
31 October 2014, 14:56. Topics: Security
Facebook is also working on a mobile Tor site
31 October 2014, 13:31. Topics: Security
RAPPOR has been released under an open-source license
31 October 2014, 01:05. Topics: Security
Flaws identified in wget and tnftp allow malicious servers to execute rogue commands on users' systems
30 October 2014, 19:16. Topics: Security
- Drupal: If you weren't quick to patch, assume your site was hacked
- Pirate Bay co-founder found guilty of hacking in Denmark
- Germany backs plan to retain personal flight data across EU
- Insurers' refusal to cover high-tech Range Rovers is warning for carmakers, Kaspersky
- Facebook gives away homebrewed OS monitoring tool
Apple's use of one-time-use tokens is the key
20 October 2014, 12:20. Topics: Security
Android 5.0 is Google's sweetest security update so far
17 October 2014, 16:12. Topics: Security
The precise circumstances are unclear, but it's becoming obvious that MSE in some cases detects a DOS/Alureon.J infection where none exists
08 October 2014, 11:30. Topics: Security
Few doubt Apple Pay will boost the market. But the stakes are rising too.
12 September 2014, 18:10. Topics: Security
Think your anti-virus program is causing a conflict with some other program? Here's how to switch it off for temporary troubleshooting
Inbound email sandboxin, real-time analysis of web traffic and much, much more
Back-up, update, have tough passwords, harden your server - there is much you can do
This technique is not well known, but it's relatively simple
Malnets are extensive distributed network infrastructures embedded in the Internet, but there is something you can do
IT security personnel spend time protecting against external attacks, but often miss the biggest source of data breaches – user-based threats including account hijacking, stolen passwords, insiders and more. Learn more about the need for a user-centric security strategy with this free Gartner report.
Download this exclusive Gartner report today, and learn about your organisations critical missing security vantage point.
The threat of user-based attacks has never been higher, with 76% of all breaches coming from accounts with access to sensitive data. With the exploitation of remote vendor access a huge concern, learn how to make working with your contractors more secure with this free e-Book from ObserveIT.
Download this ebook today, and make working with IT contractors more secure.