Two-factor authentication
-
Adithya Omanakuttan / 11 years
- 51
- 1 min read
Dropbox is a file hosting service with more than 300 million users all over the world. Simply put, it is one of the most well-known and widely used cloud storage services around. Available on all desktop and mobile platforms, Dropbox is also the cloud storage service of choice for thousands of business enterprises. However, there […]
-
Adithya Omanakuttan / 12 years
- 21
- 4 min read
When it comes to security and privacy threats over social networks, no platform gets as much negativity as Facebook. While some of the concerns that people have about Facebook privacy are justified, some of them are not. In fact, many of the so called lax privacy concerns are just as prevalent on social networks such […]
-
Adithya Omanakuttan / 12 years
- 63
- 4 min read
Without doubt, Gmail is the most popular and widely used email service all across the world today and maybe even of all time. Almost anyone who has Internet access has a functional email account, and more likely than not, an active Gmail account. Some of the features and services that Gmail and its integrated Google […]
-
Adithya Omanakuttan / 12 years
- 0
- 2 min read
Another interesting week in the IT security industry as the behemoths of the industry garner the spotlight in the news stories again. Ever improving security measures are vital for the industry and it is this constant battle against bugs and security threats that this week’s news stories are all about, again. Google taking a tough […]
-
Sakshat Karkare / 13 years
- 1
- 3 min read
Number of Government Websites Hacked so Far – 78 According to Milind Deora, Minister of State for Communications & IT, 78 government websites have been compromised by hackers till June 2013. 16,000 odd cases related to spam, malware infection, and data breach have also come to light. Victims mainly included sites run by government, defense […]
-
Soumya Patnaik / 13 years
- 3
- 3 min read
Here’s this week’s edition on some important and interesting news and updates on online security. Yahoo Japan Hacked – Officials Warned Users to Change Passwords After discovering a hacking attempt into its ID serves, Yahoo Japan has warned its users to change their passwords. According to the company, 22 million user ids might have gotten […]
-
Adithya Omanakuttan / 13 years
- 1
- 2 min read
Malware exploits Windows AutoRun Strains of malware that spread via the AutoRun feature that automatically launches programs when a USB drive or a disk is inserted into a machine is on the rise today. These kinds of malware exploit a certain bug in the AutoRun software so it is recommended that everyone disables this feature. […]
-
Adithya Omanakuttan / 13 years
- 134
- 3 min read
Cyber criminals and malicious scammers are constantly at work to devise new ways to steal confidential user data. Unfortunately, such attacks are not just restricted to the Internet. A recently discovered spate of attacks enables scammers to steal credit/debit card details and these methods are increasingly carried out in the physical world. In brief, here […]
-
Adithya Omanakuttan / 13 years
- 14
- 3 min read
Gmail users have several security features at their disposal to prevent hackers and other malicious attacks. If you are suspicious that your account has been hacked you can make use of the ‘last account activity’ feature to check for irregular account behavior. In the past we have highlighted how to activate two-factor authentication (2FA) for […]
-
Adithya Omanakuttan / 14 years
- 12
- 3 min read
Mat Honan, a tech journalist for Wired, recently witnessed an epic hacking of his Apple account, Amazon account, Macbook, iPhone, iPad, Twitter and Gmail. He admitted that all this was possible because he did not have two-factor (2-step) authentication for his Gmail account. In this post we will show you how to activate this security […]