Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
Google patches ‘loophole’ in two-factor verification system
An Interesting article in NBC News technology security section: A security firm found it could bypass Google’s two-step login verification process, reset a user’s master password and gain full control of the account “simply by capturing a user’s application-specific password.” Application-specific passwords are passwords generated by Google that you can opt to use instead of […]
Second iPhone passcode hack vulnerability discovered
An article on Naked Security about iphone vulnerability : Researchers are having a fun time with iOS 6.1 passcode locks this month, with Vulnerability Lab having discovered a second version of a vulnerability that lets a hacker slip past a lock screen to access a user’s contact list, voicemails and more. The first vulnerability, which popped […]
Google patches ‘loophole’ in two-factor verification system
An Interesting article in NBC News technology security section: A security firm found it could bypass Google’s two-step login verification process, reset a user’s master password and gain full control of the account “simply by capturing a user’s application-specific password.” Application-specific passwords are passwords generated by Google that you can opt to use instead of […]
Second iPhone passcode hack vulnerability discovered
An article on Naked Security about iphone vulnerability : Researchers are having a fun time with iOS 6.1 passcode locks this month, with Vulnerability Lab having discovered a second version of a vulnerability that lets a hacker slip past a lock screen to access a user’s contact list, voicemails and more. The first vulnerability, which popped […]