How it works
Logging In With A USB Key (U2F Explained)
Logging In With A USB Key (U2F Explained) by Techquickie VIDEO – USB keys that use Universal Two-Factor, or U2F, are an elegant way to log into your important accounts without having to enter a six-digit code every time. How do they work, and are they a good idea for you?
Privacy.com: Protect Your Bank Accounts
Privacy.com: Protect Your Bank Accounts By Justin, operational-security.com
It is no secret that I am a major fan of Blur, the privacy service that allows you to mask your email address and phone number. One of my favorite features of Blur is credit card masking – the ability to create one-time-use credit card numbers that are billed to your real credit card. A new service has come along that allows you to create one-time use credit card numbers. The service is a little bit different than Blur, and has some advantages and disadvantages. It is called Privacy.com.
Drive Cloning & Imaging
Drive Cloning & Imaging By Explainingcomputers, www.youtube.com VIDEO
Links
Published on Nov 11, 2018
SSD and HDD cloning and imaging explained and demonstrated using Macrium Reflect 7 Free Edition. Note that all cloning and imaging software should be used with great care and is downloaded, installed and used at your own risk.
The Samsung 860 EVO 250GB SSD that I used in the video can be found on Amazon here (affiliate link): https://amzn.to/2Dh2UMK
The free cloning and imaging software that I refer to in the video is available from the following links. Please note that these links are provided in good faith and that I have no association with any of these organizations:
Macrium Reflect 7 Free Edition (as I use in the video): https://www.macrium.com/reflectfree
Samsung Cloning Software (for Samsung SSDs only): https://www.samsung.com/semiconductor… EaseUs ToDo Backup Free: https://www.easeus.com/backup-softwar… Clonezilla: http://www.clonezilla.org/ My “Laptop SSD Upgrade” video referred to in this video is here: https://www.youtube.com/watch?v=EVDTN…
– Why You Should Start Using Two-Factor Authentication Now
Why You Should Start Using Two-Factor Authentication Now By Cristina Chipurici, heimdalsecurity.com
Imagine waking up on a splendid spring day, opening your laptop and realising that you can’t access your online accounts anymore. Your email has been breached, your website, your most precious work, is now gone, and your credit card was used for shady transactions.
In a nutshell, this is what I experienced almost 6 years ago.
Two-factor authentication is a mess By Garret Beard, Russell Brandom, www.theverge.com
For years, two-factor authentication has been the most important advice in personal cybersecurity — one that consumer tech companies were surprisingly slow to recognize. The movement seemed to coalesce in 2012, after journalist Mat Honan saw hackers compromise his Twitter, Amazon, and iCloud accounts, an incident he later detailed in Wired. At the time, few companies offered easy forms of two-factor, leaving limited options for users worried about a Honan-style hack. The result was a massive public campaign that demanded companies to adopt the feature, presenting two-factor as a simple, effective way to block account takeovers.
Beyond Passwords: 2FA, U2F and Google Advanced Protection by www.troyhunt.com
Last week I wrote a couple of different pieces on passwords, firstly about why we're going to be stuck with them for a long time yet and then secondly, about how we all bear some responsibility for making good password choices. A few people took some of the points I made in those posts as being contentious, although on reflection I suspect it was more a case of lamenting that we shouldn't be in a position where we're still dependent on passwords and people needing to understand good password management practices in order for them to work properly.
Two Factor Auth (2FA) List – List of websites and whether or not they support 2FA.
Use Authy To Keep Your Data Safe
How to Use Authy To Keep Your Data Safe by OnlineBusinessRealm VIDEO
Authenticator Apps
Authenticator Apps By Twit Netcast Network, www.youtube.com Video
Tasks and Reminders in Google Calendar
How to Use Tasks and Reminders in Google Calendar By Simpletivity, www.youtube.com VIDEO
What is phishing?
What is phishing? How this cyber attack works and how to prevent it By Josh Fruhlinger, www.csoonline.com
Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.
Phishing Is the Internet’s Most Successful Con By Quinn Norton, www.theatlantic.com
In the classic 1973 heist movie The Sting, two con men—played by Robert Redford and Paul Newman—build a fictitious world in a Depression-era Chicago basement to defraud a corrupt banker. They make an offtrack-betting room, hire actors to ensure the scene is convincing, and even enlist pretend law enforcement to fake-bust their mark. The film is memorable because it is one of the finest movies in the genre, well written and funny, but also because the duo’s work is so meticulously detailed.
Use Gmail and Google Drive Offline 2018
Use Gmail and Google Drive Offline 2018 by dottotech VIDEO
SIM Swappers and SIM Swap Myths
Busting SIM Swappers and SIM Swap Myths by krebsonsecurity.com
KrebsOnSecurity recently had a chance to interview members of the REACT Task Force, a team of law enforcement officers and prosecutors based in Santa Clara, Calif. that has been tracking down individuals engaged in unauthorized “SIM swaps” — a complex form of mobile phone fraud that is often used to steal large amounts of cryptocurrencies and other items of value from victims.
– How to spot a phishing email
How to spot a phishing email By Andrew Burton, www.carbonite.com
Phishing and other social engineering attacks are only increasing in frequency, and unfortunately, sophistication. However, there are a number of common indicators of a phishing attack. Knowing what to look for goes a long way to protect yourself against attacks. If you spot any of the following tip-offs, proceed with caution.
Secure Your Accounts and Passwords With a Hardware Token
Secure Your Accounts and Passwords With a Hardware Token By David Murphy, lifehacker.com
Two-factor authentication is a quick, easy way to add extra security to your accounts (or password managers). For even more security and peace of mind, consider buying a hardware token like the YubiKey or Google Titan. They’re incredibly easy to set up, and as long as you keep the USB accessory on or near you—on your keyring, for example—you’ll be able to authenticate into supported accounts and services as quickly as typing in a password. And since nobody else will have your hardware authenticator, your accounts will be protected from other attackers.
-Common Types of Two-Factor Authentication
A Guide to Common Types of Two-Factor Authentication on the Web By Jacob Hoffman-andrews, www.eff.org
Two-factor authentication (or 2FA) is one of the biggest-bang-for-your-buck ways to improve the security of your online accounts. Luckily, it's becoming much more common across the web. With often just a few clicks in a given account's settings, 2FA adds an extra layer of security to your online accounts on top of your password.
The Different Forms of Two-Factor Authentication: SMS, Autheticator Apps, and More By Chris Hoffman, www.howtogeek.com
Many online services offer two-factor authentication, which enhances security by requiring more than just your password to sign in. There are many different types of additional authentication methods you can use.
Two-Factor Authentication: Who Has It and How to Set It Up
Two-Factor Authentication: Who Has It and How to Set It Up By Eric Griffith, www.pcmag.com
In 2014, the Heartbleed exploit left everyone's login information potentially up for grabs thanks to one itty-bitty piece of code, and in the past few years, our security nightmares have only gotten worse. In fact, more data was leaked in the first half of 2017 than in all of 2016 combined.
Use LastPass for More Than Just Managing Passwords
How to Use LastPass for More Than Just Managing Passwords By Chris Hoffman, www.howtogeek.com
LastPass is more than just a password manager. It’s an encrypted vault where you can store secure notes, secret bookmarks, and even entire files. It can also save your address and credit card numbers and fill those into online forms.