Is Google Authenticator irreplaceable?
How authenticator apps work and what alternatives there are to Google Authenticator.
3274 articles
How authenticator apps work and what alternatives there are to Google Authenticator.
More than a third of people polled believe that cacti absorb harmful radiation. Strong electric fields are indeed harmful, but cactus protection works very differently to how you imagined.
Episode 284 includes more on ChatGPT, pet fish playing Pokémon and more worries around AI-generated audio
The new version of Prilex malware, used to attack POS terminals, now can block NFC transactions.
We look at how secure password managers are against hacks, and how to protect your passwords as much as possible.
Information security measures are far more effective when supported by top management. How to get this support?
Episode 283 includes ChatGPT cheaters, fake news and more concerns for the crypto world
Here are a few tips on how to make your Untappd profile as private and secure as possible.
In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?
Researchers have found vulnerabilities in the desktop client of the Signal messenger. Let’s see how dangerous they really are.
A new generation of chatbots creates coherent, meaningful texts. This can help out both cybercriminals and cyberdefenders.
Received an attractive job offer from a stranger? Be careful! It could be a scam…
Episode 282 includes ChatGPT malware, smart device failures and naughty chat programs
A few words about why Telegram isn’t as secure as its developers boast.
Why it’s important to think about what data you share online, how to prevent being doxed, and what to do if you fail.
What to do if your secret messenger isn’t secret enough.
Miscommunication between a business and its information security service can lead to unnecessary losses. Today we try to work out how to overcome the communication barrier.
Episode 281 includes Twitter data breach, CryptoZoo fail, Silvergate woes and much more!
How to know if you’re facing a scam: we identify all the red flags in a recent scam that deployed a fake cryptocurrency exchange
Everybody knows that we should prepare ourselves for a “quantum future”, but it was expected to come about in 10-20 years’ time. Is a breakthrough possible this year?