Dropbox has become a valued repository for many people, yours truly included — folks keep writing, PDFs, photos, and more in the cloud-based storage service. As such, you almost definitely don't want it compromised by enterprising hackers or devious thieves.
Two-factor authentication can provide a strong barrier against such attacks by requiring that anyone who attempts to access your account have both your password and access to your mobile devices. Here's how to set it up.
You may not keep security information or top-secret plans on your Tumblr account, but that doesn't mean it's not worth securing from potential password hacks. Here's a quick guide on setting up two-factor authentication to protect your Tumblr gifsets, memes, songs, blogs, and more.
If you use Facebook, chances are there's a whole host of personal and semi-private information you don't want anyone else getting ahold of. Never fear: You can protect your Facebook account from potential hacks with little trouble thanks to the company's two-factor authentication integration. Here's how you can set it up.
Twitter can be a powerful mouthpiece for yourself, your brand, or your business — and an even more powerful weapon if your login credentials fall into the wrong hands. You can protect your account by enabling Twitter's two-factor authentication options; here's how.
iPhones have supported hardware encryption for over 5 years. Android phones... well, it's complicated.
When Google announced Android Lollipop, one of the most important features for customers in the post-Edward Snowden era was hardware encryption enabled by default. Put simply, on first-boot your personal data would be kept far safer on your personal device. Unfortunately, it looks like default hardware encryption in Lollipop is a nice-to-have, not a must-have, and many Android phone vendors have simply decided to keep it off.
Authy, a company that specializes in security through two-factor authentication, has been purchased by cloud communication services company Twilio. The two companies have been working together since 2012, with Authy using Twilio's technology to deliver authentication codes through SMS and phone calls. For the time being, Authy will continue to function as it always has, though certain parts of the company will expand with the acquisition, according to fonder Daniel Palacio:
Security, as we take great pains to repeatedly point out, is something that deeply affects people. It affects their stress and trust levels when dealing with technology. When it's misreported it turns what should be an empowering experience into one of fear, uncertainty, and doubt. And it's far too frequently done just to get the worst kind of attention. The latest case in point is a — I don't want to call it a report — from GFI which claims OS X and iOS were the "most vulnerable operating systems of 2014. And, frankly, it's bullshit.
Update: A new report in The Intercept claims that Gemalto is drastically downplaying the effects of this attack. In the report, several security researchers came to the conclusion that "the company made sweeping, overly-optimistic statements about the security and stability of Gemalto's networks, and dramatically underplayed the significance of the NSA-GCHQ targeting of the company and its employees."
Original story: Digital security vendor Gemalto revealed its findings today following last week's report of an incursion by the NSA and the GCHQ into the vendor's SIM card encryption keys. While Gemalto noted that an operation by NSA and GCHQ "probably happened" in 2010 and 2011, the intrusion could not have resulted in a "massive theft" of SIM card encryption keys as the breach affected the company's office network and not its secure networks.
Digital security vendor Gemalto has announced that its products are "secure" following a report last week stating that the NSA and its UK counterpart, the Government Communications Headquarters (GCHQ), hacked into the vendor's SIM cards.
According to new documents leaked by Edward Snowden, the NSA and its UK counterpart, Government Communications Headquarters (GCHQ), hacked into the computers of Gemalto, a company that manufactures SIM cards for a large number of carriers around the world. In doing so, the intelligence agencies acquired encryption keys that would allow them to intercept communications from customers of all four major U.S. carriers, along with 450 others around the world.