Skip to main content

Attention PGP Users: New Vulnerabilities Require You To Take Action Now

Attention PGP Users: New Vulnerabilities Require You To Take Action Now | Electronic Frontier Foundation

Attention PGP Users: New Vulnerabilities Require You To Take Action Now | Electronic Frontier Foundationhttps://www.eff.org/deeplinks/2018/05/attention-pgp-users-new-vulnerabilities-require-you-take-action-nowUPDATE (5/14/18): More information has been released. See EFF’s more detailed explanation and analysis here.A group of European security researchers have released a warning about a set of vulnerabilities affecting users of PGP and S/MIME. EFF has been in communication with the research team, and can confirm that these vulnerabilities pose an immediate risk to those using these tools for email communication, including the potential exposure of the contents of past messages.

Facebook admits it poses mental health risk – but says using site more can help

Facebook admits it poses mental health risk – but says using site more can help | Technology | The Guardianhttps://www.theguardian.com/technology/2017/dec/15/facebook-mental-health-psychology-social-media?utm_source=esp&utm_medium=Email&utm_campaign=GU+Today+main+NEW+H+categories&utm_term=256823&subid=19723158&CMP=EMCNEWEML6619I2Facebook has acknowledged that social media use can be bad for users’ mental health, a sign the company is feeling pressure from a growing chorus of critics raising alarms about the platform’s effect on society. The company’s public recognition of some of its platform’s detrimental effects came days after a former Facebook executive made headlines with a speech slamming the corporation, saying: “The short-term, dopamine-driven feedback loops that we have created are destroying how society works. No civil discourse, no cooperation, misinformation, mistruth.”

SaveSaveSaveSave

The WIRED Guide to Digital Security

https://www.wired.com/2017/12/digital-security-guide/?mbid=nl_120917_daily_list1_p1In an age of nonstop breaches and hacks, here are ways to improve your online security based on your level of risk, from average user to NSA contractor. These won’t prevent the next megabreach or banish ransomware from the earth. They’re not all-encompassing. But they’ll help get you in the mindset of the types of steps you should be taking based on your particular situation. And they’ll help ensure that the next time you read one of those paralyzing headlines, it doesn’t apply to you.

Ready for more secure authentication? Try these password alternatives and enhancements

Secure authentication means moving beyond passwords

Secure authentication means moving beyond passwordshttps://www.techconnect.com/article/3237827/password-security/ready-for-more-secure-authentication-try-these-password-alternatives-and-enhancements.html?idg_eid=412374c121fe539738655f52ae490f8f&email_SHA1_lc=f6d5fe2a378ea202f8af35117edcb06be2465c6d&cid=tcon_nlt_techconnect_daily_2017-11-24Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

KRACK WPA2 protocol Wi-Fi attack: How it works and who’s at risk

KRACK WPA2 protocol Wi-Fi attack: How it works and who's at risk - TechRepublic

KRACK WPA2 protocol Wi-Fi attack: How it works and who’s at risk – TechRepublichttp://www.techrepublic.com/article/krack-wpa2-protocol-wi-fi-attack-how-it-works-and-whos-at-risk/?ftag=TRE684d531&bhid=27689259515740508250262421970472A vulnerability in the WPA2 protocol used in secured Wi-Fi networks allows hackers to force devices to install arbitrary encryption keys. Here are the details of how the attack works.

Why you are at risk if you use SMS for two-step verification

Do you use SMS for two-step verification? Don't. - CNET

Do you use SMS for two-step verification? Don’t. – CNEThttps://www.cnet.com/how-to/why-you-are-at-risk-if-you-use-sms-for-two-step-verification/?ftag=CAD1acfa04&bhid=27170905380744054130315685538756Do two-step verification the right way to keep hackers at bay. Hackers have been able to trick carriers into porting a phone number to a new device in a move called a SIM swap. It could be as easy as knowing your phone number and the last four digits of your social security number, data that tends to get leaked from time to time from banks and large corporations. Once a hacker has redirected your phone number, they no longer need your phone in order to gain access to your 2SV codes.

Bill Gates to the class of 2017: Find work in these three fields if you want to make an impact

Dear Class of 2017… | LinkedIn

Dear Class of 2017… | LinkedInhttps://www.linkedin.com/pulse/dear-class-2017-bill-gates?trk=eml-email_feed_ecosystem_digest_01-hero-0-null&midToken=AQFV9bBOP56j9Q&fromEmail=fromEmail&ut=1gpS2kfWgzdTM1Congratulations! You’ve just accomplished something I never managed to do—earn a college degree. Between your commencement speaker and every aunt and uncle at your graduation party, I am sure you are getting a lot of advice. At the risk of piling on, I thought I would share a few thoughts.