Strengthening 2-Step Verification with Security Key

Tuesday, October 21st, 2014

2-Step Verification offers a strong extra layer of protection for Google Accounts. Once enabled, you’re asked for a verification code from your phone in addition to your password, to prove that it’s really you signing in from an unfamiliar device. Hackers usually work from afar, so this second factor makes ...

Massive, undetectable security flaw found in USB: It’s time to get your PS/2 keyboard out of the cupboard

Thursday, July 31st, 2014

Security researchers have found a fundamental flaw that could affect billions of USB devices. This flaw is so serious that, now that it has been revealed, you probably shouldn’t plug a USB device into your computer ever again. There are no known effective defenses against this variety of USB attack, though ...

Gear to Block ‘Juice Jacking’ on Your Mobile

Wednesday, June 18th, 2014

Ever since I learned about the threat of “juice-jacking” — the possibility that plugging your mobile device into a random power charging station using a USB cord could jeopardize the data on that device — I’ve been more mindful about bringing a proper power-outlet charging adapter on my travels. But in the ...

New Windows malware tries to infect Android devices connected to PCs

Friday, January 24th, 2014

A new computer Trojan program attempts to install mobile banking malware on Android devices when they're connected to infected PCs, according to researchers from Symantec. This method of targeting Android devices is unusual, since mobile attackers prefer social engineering and fake apps hosted on third-party app stores to distribute Android malware. "We've ...

How to Secure USB Drives and Other Portable Storage Devices

Wednesday, May 29th, 2013

As individuals and organizations digitize more data, they become more susceptible to major data breaches. Though convenient, inexpensive USB flash memory sticks and other portable storage devices certainly don't help the cause, because workers use them transport databases and other confidential information. On top of the real danger of misused ...