Microsoft is about to officially join the fight for authentication without pesky passwords. The company recently announced that Windows 10 will support the Fast Identity Online (FIDO) 2.0 specification. The end result is that instead of using passwords to log in to PCs, Microsoft services, and other third-party accounts, you'll also be able to use a fingerprint or eye scan--possibly integrated with a key fob for two-factor authentication.
Ian Paul |
18 Feb |
Read more
Apple recently extended its two-step verification protections to two more services. The SMS-based security measure now covers FaceTime and iMessage in addition to iCloud and your Apple ID, as first reported by The Guardian.
Ian Paul |
14 Feb |
Read more
Gamers looking for voice chat software should be careful what they click on. Security firm Malwarebytes recently came across a new bit of malware that is pretending to be the installer for Razer Comms, the voice chat system from Razer.
Ian Paul |
06 Feb |
Read more
Despite criticisms and public outcry, Verizon isn't giving up on its UIDH "perma-cookie" advertising program--but the company will give subscribers a larger say in the matter. Verizon customers will soon have the ability to opt-out of the UIDH program.
Ian Paul |
03 Feb |
Read more
Cloud storage is incredibly convenient, but it can also be confusing. Sometimes you're just not sure what files to put up there or if you should store anything online at all. One way to approach the issue is to ask yourself what you want to get out of storing files online. Is your overarching concern convenience, security, or a mix of the two?
Ian Paul |
24 Jan |
Read more
Google's not just picking on Windows. The search company's Project Zero initiative recently published three unpatched bugs in OS X, 90 days after the group privately disclosed the issues to Apple. The new publications bring the number of unfixed security vulnerabilities in OS X discovered by Google to six, according to the Project Zero database.
Ian Paul |
24 Jan |
Read more
We've talked before about the importance of virtual private networks (VPNs) to keep you safe and protected when using open Wi-Fi networks. The downside of VPN's, however, is that some need manual set-up, requiring you to muck around with the built-in VPN client in Windows or a third-party client like OpenVPN.
Ian Paul |
22 Jan |
Read more
Watch out Windows XP diehards: if you run the open source media player VLC you may be vulnerable to malicious attacks. A bug discovered in November affecting VLC was recently made public on Full Disclosure, a security-focused mailing list.
Ian Paul |
21 Jan |
Read more
The holidays are over, the new year has begun, and thoughts are turning back towards normal life--and post-holiday finances. There's a reason that "Save more money" is such a popular New Year's resolution.
Ian Paul |
17 Jan |
Read more
The brain behind Cryptocat and miniLock is back with yet another tool designed to make your day-to-day life more secure. Peerio, Nadim Kobeissi's latest creation, is a cloud-based, end-to-end encrypted communications suite that lets you send messages and share files as easily as you use Gmail or Skype's IM tool.
Ian Paul |
16 Jan |
Read more
The security of the web itself was tested in unprecedented ways in 2014--but the news isn't all bad.
Ian Paul |
15 Jan |
Read more
Google just spilled the beans on a Windows 8.1 vulnerability that could give an attacker elevated privileges and Microsoft is not happy about it.
Ian Paul |
13 Jan |
Read more
If there's one thing websites love to do it's track their users. Now, it looks like some browsers can even be tracked when they're in private or incognito mode. Sam Greenhalgh of U.K.-based RadicalResearch recently published a blog post with a proof-of-concept called "HSTS Super Cookies." Greenhalgh shows how a crafty website could still track users online even if they've enabled a privacy-cloaking setting.
Ian Paul |
09 Jan |
Read more
The computer industry has worked hard to make sure that a lot of the gadgets we use are mostly plug-and-play. In other words, you just fire up the device, login and you're ready to go--no configuration necessary. One device you should never consider "plug-and-play," however, is your home's network and wireless router.
Ian Paul |
20 Dec |
Read more
Worried about hackers taking a crack at the cards stashed in your pants? The year's most low-tech "wearable" has your back (pocket).
Ian Paul |
18 Dec |
Read more