Google has started forced enrollment in its two-factor authentication program (2FA). Google actually calls it "two-step verification" (2SV). I don't know why. 2SV requires users to input the correct password plus one other form of identification, which can be a code that appears on your smartphone, a USB stick or other physical security key, or an associated code you find in Google's Authenticator app and enter in a timely manner. Continue Reading →
Safety Security & Privacy
Posts I've written about Safety Security & Privacy. Subscribe to my newsletter to make sure you don't miss anything.
Meta announced that Facebook will end its face recognition feature. You know when you upload a picture and the app saves you time because it knows how to tag everyone? Facebook is going to turn that stuff off, but… it's not deleting any data and it's not going to stop using its tools internally. Continue Reading →
A ransomware gang has targeted Ferrara Candy, the confectionary responsible for producing 85 percent of the nation’s supply of candy corn (approximately seven billion pieces per year). Continue Reading →
Imagine a world without passwords. OK. Enough dreaming. Continue Reading →
Today is a great day to have a chat with your team and go over your business resiliency and business continuity plan. If you get hit with a ransomware attack this afternoon, what happens? Who gets notified and in what order? Who initiates the restore protocols? How many hours, days, weeks of backups are available? Which servers go back online first and in what order? Continue Reading →
The Biden administration and Western allies formally blamed China for a massive hack of Microsoft Exchange email server software earlier this year. Shelly Palmer talks with Bianca Peters and Kerry Drew about what it means and why you should care. Original Airdate: July 20, 2021 Continue Reading →
This morning, the AP is reporting that the Biden administration is blaming China for the massive hack of Microsoft's Exchange server software earlier this year. Continue Reading →
REvil, the ransomware gang that attacked meat supplier JBS Foods this spring and a major IT software vendor this month, has mysteriously gone dark. Its websites are gone and there has been no word from their spokespeople. Continue Reading →
The FCC will mandate Verizon, AT&T, T-Mobile, and Comcast to use Stir/Shaken, a technical protocol and framework that creates a call verification system that makes it harder for scammers to hide their phone number. Continue Reading →
Tim Cook has claimed in an interview with Brut that if Apple was forced to allow sideloading of apps, as Android does, it would destroy security and privacy of iOS. Continue Reading →