by Steve Bell
January 16, 2017
As the first pages of 2017 unfurl there is an unsurprising focus on the Internet of Things security given that smart devices are not only big news but also big sales. One security researcher reckons that hacked smart meters could be used to black out your home while a security industry exec says 2017 could be the year when the entire internet goes down. The World Economic Forum publishes its annual risk report and chillingly points to the dangers of weaponised IoT and artificial intelligence. Closer to home, hackers are still doing their thing; a Netflix phishing campaign has been detected, a Hello Kitty database has been leaked on the internet and Android device users have been warned about a fake version of the Super Mario Run game which is used to plant banking malware on mobile devices.
by Steve Bell
January 11, 2017
Two-factor authentication adds a layer of protection to the standard password method of online identification. You simply add another identification feature alongside your password and it’s usually a phone number. It’s free and quick and easy to do. Critics point out that because you usually have to use your phone number it’s just one more bit of information you’re handing over to a third party. This is true, but as hacks and database breaches become increasingly common it’s also one of the most practical and simple protection options available.