Free eBooks: The Essentials of Information Security Kit: Includes a Free PC Security Handbook – 2nd Edition eBook

For today’s free ebooks, we have a kit which includes 4 resources: The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions. -How to Transform Employee Worst Practices Into IT Security Best Practices -PC Security Handbook – 2nd Edition […]

Advertisements

Distorted Speech Could Trick Voice Recognition For Mobile Attacks

Researcher say its possible to hide garbled commands among other noise and surreptitiously trigger voice control on a phone. But it seems highly unlikely the method could be used for a genuine attack in its current form. A group of eight researchers from Georgetown University and University of California, Berkely investigated the proposition that its […]

Google Two-Factor Authentication Becomes One-Click

Google has made two-factor authentication a little simpler to use. It’s now possible to confirm your identity on a phone with a single tap rather than typing a code. At the moment, if you login to Google on an unfamiliar computer and you’re using two-factor authentication, you have to receive a six-digit code though either […]

GPS Fail Not Hacking, Lexus Says

The built in navigation systems in many Lexus vehicles have been hit by a “purple screen of death.” Despite some initial excitement, the problem appears to be a failed software update rather than hacking. While reports from owners are mixed, it appears the problem may affect all Lexi (to give the correct plural) from 2014 […]

Free eManual: Ransomware Hostage Rescue Manual for IT Pros

For today’s free eBook, get the Ransomware Hostage Rescue Manual for IT Pros for free! Being in IT I’m sure you know someone who’s been hit with ransomware or you have been though it yourself. Wouldn’t it be great to have a manual of what to do when you get hit and how to prevent […]

10-Year-Old Claims $10,000 Instagram Bug Bounty

A 10-year-old has tipped off Facebook about a flaw that made it possible to delete any comment on Instagram. The Finnish boy has earned a $10,000 bounty despite not officially being old enough to have an Instagram account. While Facebook hasn’t revealed the full details of the ¬†flaw, it has said it was in a […]

FBI Could Hack Nationwide

US courts may soon have the power to authorize remote ‘hacking’ searches of computers across the country and even abroad. The Supreme Court has approved a change to rules about the scope of such searches. Unlike most Supreme Court rulings, this isn’t on a specific (precedent-setting) case. Instead the court was required to approve a […]

FREE eBook: Mobile Security: How to Secure, Privatize, and Recover Your Devices (a $26.99 value)

For today’s free eBook, we offer you “Mobile Security: How to Secure, Privatize, and Recover Your Devices” (a $26.99 value) for free! In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data’s security. There will be special […]