Google To Explicitly Flag Insecure Sites

The Chrome browser will soon start flagging sites with password or card number fields that don’t use encryption. The change in January will be the first of a multi-step process. Until now Chrome has worked like most browsers by putting the emphasis on positively identifying secure sites with the familiar padlock icon in the address […]


Distorted Speech Could Trick Voice Recognition For Mobile Attacks

Researcher say its possible to hide garbled commands among other noise and surreptitiously trigger voice control on a phone. But it seems highly unlikely the method could be used for a genuine attack in its current form. A group of eight researchers from Georgetown University and University of California, Berkely investigated the proposition that its […]

Google Two-Factor Authentication Becomes One-Click

Google has made two-factor authentication a little simpler to use. It’s now possible to confirm your identity on a phone with a single tap rather than typing a code. At the moment, if you login to Google on an unfamiliar computer and you’re using two-factor authentication, you have to receive a six-digit code though either […]

Free eManual: Ransomware Hostage Rescue Manual for IT Pros

For today’s free eBook, get the Ransomware Hostage Rescue Manual for IT Pros for free! Being in IT I’m sure you know someone who’s been hit with ransomware or you have been though it yourself. Wouldn’t it be great to have a manual of what to do when you get hit and how to prevent […]

FREE eBook: Mobile Security: How to Secure, Privatize, and Recover Your Devices (a $26.99 value)

For today’s free eBook, we offer you “Mobile Security: How to Secure, Privatize, and Recover Your Devices” (a $26.99 value) for free! In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data’s security. There will be special […]