Add LinkedIn to the list of Internet companies trying to make themselves safer from cyberattacks by adding two-step authentication. Users of the professional social-networking site now have the option to add two-step verification to their ...
Twitter's SMS-based, two-factor authentication feature could be abused to lock users who don't have it enabled out of their accounts if attackers gain access to their log-in credentials, according to researchers from Finnish anti-virus ...
Tags: Computer Products, software
A former member of a band of hackers faces up to 10 years in prison after pleading guilty Tuesday to a single computer hacking charge. Jeremy Hammond, 28, of Chicago admitted to participating in more than a half dozen attacks perpetrated ...
Tags: Stratfor Hack, Computer Hacking
Microsoft brushed off a dubious hacker's claim on Thursday that he stole 47 million account credentials for Microsoft's Xbox Live gaming service. The hacker, who goes by the Twitter handle "@Reckz0r," wrote on Pastebin that Microsoft ...
Tags: Microsoft, Computer Products, Claim Xbox
Twitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more secure login process. The system, called Login Verification, gives users the option to have a verification code sent to their mobile phone ...
Tags: Twitter, Sign-in, Computer Products
Twitter will offer users two-factor authentication when they sign in as "a second check to make sure it's really you". Twitter is stepping up its security measures following a series of high-profile breaches by hackers hitting media ...
Tags: Twitter, Double Sign in
Yahoo Japan, the country's largest Web portal, said up to 22 million user IDs may have been leaked during a hack that was discovered last week. The company emphasized that the IDs are already public information, and no passwords or other ...
Tags: Yahoo Japan, User ID, Computer Products
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
Tags: Computer Products, software
Security researchers from Trend Micro have uncovered an active cyber-espionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
Spiceworks has teamed up with Fiberlink to add mobile device management functionality to the next version of its free network and IT management software. As the BYOD (bring-your-own-device) trend accelerates, IT departments are seeking ...
Tags: Integrated MDM, Spiceworks
New social media privacy laws that have been enacted in several states around the country, or those in the works, present something of a mixed bag for businesses. While the laws generally limit companies from asking job seekers and ...
Tags: Social Media, Businesses, Mixed Bag, Computer Products
Add-ons, Keeper Sharing and Keeper Extensions, develop a robust functionality Online consumer data security software, Keeper, has been bolstered with two major features to help better protect consumers' critical data, with Keeper Sharing ...
Google has introduced an integrated developer environment (IDE) aimed at easing development of Android apps. Android Studio made its debut Wednesday at the Google I/O conference in San Francisco. Android developers could use the Android ...
Tags: Google IDE, Android App
Hackers are finding it pays to call ahead before sending malware-laden email. Symantec has seen what it describes as a sophisticated social engineering campaign aimed at French-speaking accounting and finance department employees. The ...
Tags: Malware, Computer Products
Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation. Hundreds of organizations across Australia are using out-of-date industrial control systems (ICS) to control the ...