Skip to content

Security and tech news with Xploiter.com

Be Safe, Be Secure

Category: 2FA

Posted on June 12, 2017

Apple to auto-update devices to two-factor authentication

iOS 11 and macOS High Sierra public beta testers will be automatically upgraded from 2SV. But, most users are unclear about the benefits of using 2FA.

Posted on June 10, 2017

Threatpost News Wrap, June 9, 2017

How EternalBlue was ported to Windows 10, a Facebook phishing study, QakBot, and this week’s Apple security announcements are all discussed.

Posted on May 24, 2017

Hacked Twitter account spits out poison – make sure yours isn’t next

Salem State University was horrified when its account was taken over and used to spout racist venom – how could they have prevented it? We’ve got some advice

Posted on May 23, 2017

Man jailed for stealing images and details from more than 50 women

When someone like this is caught and jailed it’s a sobering reminder to check our own digital footprint – here are some tips to help you secure your information

Posted on May 23, 2017

Digital watermark leads police straight to Bollywood pirates

Digital signing led police to the would-be extortionists – a welcome turnaround for the movie industry after a run of thefts

Posted on May 19, 2017

Walk this way: how you roll could become how you log in

Combining biometrics and wearable technologies opens up new possibilities for future multi-factor authentication systems

Posted on May 19, 2017

News in brief: twins fox bank’s voice security; FCC moves on net neutrality; torrent site closes

Your daily round-up of some of the other stories in the news

Posted on May 11, 2017

News in brief: Game of Thrones tells cast to use 2FA; Cisco flaw patched; Windows 10 on 500m devices

Your daily round-up of some of the other stories in the news

Posted on May 3, 2017

Fraudsters draining accounts with ‘SIM swaps’ – what to do

If crooks can get a new SIM issued in your name, they take over your phone number and your text messages… and your phone goes dead.

Posted on April 26, 2017

More LastPass flaws: researcher pokes holes in 2FA

LastPass has been in the news again for another chink in its armour – though it has now been fixed, you’ll be glad to hear

Posts navigation

Page 1 Page 2 Next page

Recent Posts

  • Health trust rapped on illegal use of patient data in Google AI deal
  • GDPR: who needs to hire a data protection officer?
  • News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online
  • Now Any Florida Resident Can Challenge What Is Taught In Public Florida Schools
  • Court Blocks EPA Effort To Suspend Obama-Era Methane Rule

Recent Comments

  • Eric Plambeck on An Assembly Language Primer(C) 1983 by David Whitman
  • Frank van Bommel on Delphi Tips
  • Simon Steed on URL Rewriting in Asp.net using URLRewriter
  • Simon Steed on URL Rewriting in Asp.net using URLRewriter
  • sen on URL Rewriting in Asp.net using URLRewriter

Archives

  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • September 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • October 2010
  • September 2010
  • August 2010
  • March 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008

Categories

  • 2FA
  • angler
  • car hacking
  • certificate authorities
  • chrome
  • Cisco systems
  • Cisco Telepresence
  • Cloud Security
  • Critical Infrastructure
  • Cryptography
  • DDoS
  • DMCA
  • exploit kit
  • Facebook
  • Gmail
  • google
  • Google Transparency Report
  • Government
  • HackerOne
  • Hacks
  • HTTPS
  • ICS
  • IoT
  • IoT botnet
  • IoT devices
  • IoT security
  • IT
  • Javascript
  • Kevin Beaumont
  • Locky
  • malicious JavaScript
  • Malware
  • Microsoft
  • Mirai
  • Mirai botnet
  • Mirai malware
  • Mobile Security
  • mobile spyware
  • Neutrino
  • Nuclear
  • open source software
  • Pegasus
  • Privacy
  • ransomware
  • RIG Exploit Kit
  • SCADA
  • Schneider Electric
  • Science
  • Spyware
  • SSL
  • Uncategorised
  • Uncategorized
  • Vulnerabilities
  • Web Security
  • zero day vulnerability

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Pages

  • A List Of Rules That Every C Programmer Should Follow
  • A tutorial on I/O Streams
  • A TUTORIAL ON POINTERS AND ARRAYS IN C
  • An Assembly Language Primer(C) 1983 by David Whitman
  • C Frequently Asked Questions (FAQ) Full Version
  • C/C++ Null Pointers
  • C++ Operators by John M. Dlugosz
  • C++ Overview by John Tal
  • comp.lang.c Answers to Frequently Asked Questions (FAQ List)
  • Delphi Tips
  • Delphi Tutorial – Lesson 1 12/29/98 Frank Fortino ffortino@svn.net Copyright 1999
  • Delphi Tutorial – Lesson 2 More Delphi Stuff 1/4/99 Frank Fortino ffortino@svn.net Copyright 1999
  • General Steps in Converting C applications to C++
  • Home
  • How to do things in Visual Basic
  • IBM Personal Computer Assembly Language Tutorial
  • LocalSQL.hlp as HTML File
  • Privacy Policy
  • Programming in C – a shortish tutorial by Toto
  • Sample Page
  • Using the Debug Command (dos)
  • Write simple scripts in PERL (CGI)
Privacy Policy Proudly powered by WordPress
Got a hot tip? Send it to us!
[contact-form-7 404 "Not Found"]
Got a hot tip? Send it to us!
[contact-form-7 404 "Not Found"]