Multifactor Authentication trumps knowledge based Authentication (KBA)

What is knowledge-based authentication? The KBA design asks the user to correctly answer at least one question, a “secret” only the user would know.There are two types of KBA: 1) Answering a question that the user has pre-selected (static scheme), and 2) Answering a question that’s determined by garnering data in public records (dynamic scheme)....more

Security

My house feels like the safest on the block tonight.  I am currently dog-sitting my Mom’s dog, Keisha.  I also have a dog, Kloë.  I know, neither of them seem fierce….And neither of them look fierce….But when they bark when someone’s at the door, I feel very safe....more

6 ways to declutter your digital life

It’s the New Year so time for new starts and new resolutions. With a new year upon us, now is a good time to clean out the clutter. Clutter is overwhelming, messy and inefficient and it transcends in both our physical and digital lives.Here are some tips to help clear the clutter out of your digital world.1. Backup the Data on Your DevicesYou are (hopefully) about to delete lots of stuff....more

Devising a data security strategy

Whether you are an individual who games, a work-at-home employee, a family of four that shops online, a road warrior or even a small business, chances are you have data to protect—and so this all pertains to you.Fundamentals:...more

Why Mobile Security is a Must

Smartphone use continues to increase. More than one third of Americans have dropped landlines and only use mobiles. It is very possible that within the next 10 years, the landline will be obsolete and we will all be wireless....more

That's the way it's always been done, and other reasonings of a well run college

The Setting: TAFE college, locked classroom.When: Monday before Cup Day. (No, it's not important other than to signal to other Australians that there would be a very low attendance rate as Cup Day, the next day, is a holiday.) Time: 8.30am. (And I pride myself on getting there on time. Me and two students. )The Aggravation: The fact that this classroom is locked for the 13th time in a row despite the fact that I am timetabled in there, same time, every week....more

Hacker’s Delight: Google Chrome’s Security Flaw

Earlier this month, the internet was in an uproar over a security flaw (or feature) that was discovered in Google Chrome. As an avid Chrome user, I was shocked to find out what all the noise was about....saved passwords....more

Facebook Security... NOT

  I'm re-posting this little spoof on Fb SECURITY with a catchy picture to trick you guys into reading it. ...more

Dropcam HD WiFi Camera

 The Dropcam HD WiFi Camera is one of the most versatile cameras on the market.  Whether it is used as a baby monitor, video camera or security camera, users are sure to like it ease of use, set-up and 720p HD quality video....more

Kensington ComboSaver Lock – Avoid Travel Theft

  Kensington ComboSaver Lock Traveling with a laptop is often a necessity.  Even if it is just to the local Starbucks, theft is a definite possibility.  In fact, the FBI says that a laptop is stolen every 53 seconds according to its report in 2005....more
Menu