Distorted Speech Could Trick Voice Recognition For Mobile Attacks

Researcher say its possible to hide garbled commands among other noise and surreptitiously trigger voice control on a phone. But it seems highly unlikely the method could be used for a genuine attack in its current form. A group of eight researchers from Georgetown University and University of California, Berkely investigated the proposition that its […]



Google Two-Factor Authentication Becomes One-Click

Google has made two-factor authentication a little simpler to use. It’s now possible to confirm your identity on a phone with a single tap rather than typing a code. At the moment, if you login to Google on an unfamiliar computer and you’re using two-factor authentication, you have to receive a six-digit code though either […]



Free eManual: Ransomware Hostage Rescue Manual for IT Pros

For today’s free eBook, get the Ransomware Hostage Rescue Manual for IT Pros for free! Being in IT I’m sure you know someone who’s been hit with ransomware or you have been though it yourself. Wouldn’t it be great to have a manual of what to do when you get hit and how to prevent […]

FREE eBook: Mobile Security: How to Secure, Privatize, and Recover Your Devices (a $26.99 value)

For today’s free eBook, we offer you “Mobile Security: How to Secure, Privatize, and Recover Your Devices” (a $26.99 value) for free! In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data’s security. There will be special […]

Google.com Dangerous Says Google (But Not Anymore!)

Google briefly labelled Google.com as “partly dangerous.” The automated warning appears to be a quirk caused by hosted content. The warning came on Google’s own Transparency Report page, which includes details of its Safe Browsing technology. That’s the database that gives warnings in Google’s search tools and the Chrome browser when pointing to a potentially risky […]