Skip to content Skip to footer

Microsoft Offers Passwordless Authentication

Applications using Azure Active Directory (AD) to authenticate — a category that includes Office 365, among other things — will soon be able to stop using passwords entirely. It's not as counter-productive as it sounds. App-based Authentication Azure AD accounts can already use the Microsoft Authenticator app for two-factor authentication. Two-factor authentication combines a password with…

Read More

Intel: Foreshadow Flaws

Another Week, Another Security Flaw Foreshadow, also known as L1 Terminal Fault, is another problem with speculative execution in Intel’s processors. Foreshadow may allow malicious software to break into secure areas that even the Spectre and Meltdown flaws couldn’t crack. What Is Foreshadow? Specifically, Foreshadow attacks Intel’s Software Guard Extensions (SGX) feature. This is built into Intel chips…

Read More

Amazon’s Alexa Coming To Windows

Welcome To Windows, Alexa! Microsoft has Cortana, its built-in digital assistant included in Windows 10 operating systems. Apple has Siri, its own digital assistant. Then, of course, there is Amazon’s Alexa. Which, unless you have been living under a rock, might be the most well known digital assistant thanks to Amazon’s marketing campaigns and the…

Read More

Augmented Reality: Changing Our Lives

Making Virtual History Let’s rewind about 20 years. Smart phones were something that existed alongside of flying cars, robotic maids, and X-ray vision.A couple years ago, augmented reality was in the same place that smart phones were in. Now, augmented reality is often talked about in articles, on websites, and in day-to-day conversations. Augmented reality…

Read More

Legitimate E-Mail Or Phishing Attempt?

How To Thwart An E-mail Phishing Attempt E-mail phishing attempts are on the rise thanks to advancements in virus and malware detection. These have slowed down the bad guys’ data mining and money-making attempts. As a result, they're going back to basics.Luckily, e-mail phishing has numerous tell-tale signs. Links: Don't Click 'Em Emailing phishing attempts usually…

Read More

Yes, Your Phone Can Be Hacked

Hacking: Not Restricted To Computers You can have the best devices and security measures and still fall victim to a hacker... even on your cell phone. After all, it has an operating system just like a computer and ways to wiggle in through exploits.Got an Apple device? Don’t think that you're exempt from a phone…

Read More