Half Sized Blog Element (Single Author Style)

Half Sized Blog Element (Multi Author Style)

Google patches ‘loophole’ in two-factor verification system

An Interesting article  in NBC News technology  security section: A security firm found it could bypass Google’s two-step login verification process, reset a user’s master password and gain full control of the account “simply by capturing a user’s application-specific password.” Application-specific passwords are passwords generated by Google that you can opt to use instead of […]

Second iPhone passcode hack vulnerability discovered

An article on Naked Security about iphone vulnerability :  Researchers are having a fun time with iOS 6.1 passcode locks this month, with Vulnerability Lab having discovered a second version of a vulnerability that lets a hacker slip past a lock screen to access a user’s contact list, voicemails and more. The first vulnerability, which popped […]

Google patches ‘loophole’ in two-factor verification system

An Interesting article  in NBC News technology  security section: A security firm found it could bypass Google’s two-step login verification process, reset a user’s master password and gain full control of the account “simply by capturing a user’s application-specific password.” Application-specific passwords are passwords generated by Google that you can opt to use instead of […]

Second iPhone passcode hack vulnerability discovered

An article on Naked Security about iphone vulnerability :  Researchers are having a fun time with iOS 6.1 passcode locks this month, with Vulnerability Lab having discovered a second version of a vulnerability that lets a hacker slip past a lock screen to access a user’s contact list, voicemails and more. The first vulnerability, which popped […]