Congress talks about implementing a national standard for data privacy TechRepublic's Karen Roby talks with ZDNet's Stephanie Condon about what Congress is doing to potentially implement a national standard for data privacy. Read more: https://zd.net/2EE9I6X Microsoft didn't entirely steer clear of controversy in 2018, but it appears to have dodged enough issues not to have lost favor with the US public, unlike many other tech rivals. Microsoft ranks ninth in this year's Axios and Harris Poll's survey about the US public's perception of the 100 most visible companies. The survey aims to gauge how the public feels about the most visible companies in terms of trust and reputation. Microsoft is now one of only four tech companies in the top 10. Others include Amazon in second place, Samsung in seventh, and Sony in 10th. Facebook's reputation ranking has taken a huge dive, falling 43 places to 94th position this year, while Google's ranking has fallen 13 places to … [Read more...] about Amazon, Samsung, Microsoft top the tech world for reputation, but who do you trust?
Microsoft 2 factor authentication app
Two-factor authentication is a good way to add an extra layer of security to online accounts. It requires the use of your smartphone, however, which is not only inconvenient, but it can be a problem if your phone is lost or breached. Hardware security keys can offer an extra layer of security to password-protected online accounts and, in turn, your identity. They’re also not hard to install. Here’s how to set them up for your Google account, Facebook, and Twitter. Security keys connect to your system using USB-A, USB-C, or Bluetooth, and they are small enough to be carried on a keychain (with the exception of Yubico’s USB-C nano key, which is so small that it’s safest when kept in your computer’s USB port). They mainly use an open authentication standard called FIDO U2F. There is also an improved Fido2 standard, although not all the keys or applications use it. When you insert a security key into your computer or connect it wirelessly and press a button on … [Read more...] about How to use a two-factor security key
gWhen it comes to protecting your data, SMS-based or app-based two-factor authentication using your smartphone is more secure than depending only on passwords. But it can also be time-consuming to set up and use. Hardware-based security keys provide a fast, no-fuss way to use two-factor authentication without having to mess around with your phone. They are based on the FIDO U2F standard, a security protocol that is difficult to intercept; it was developed by Google and security company Yubico, and is now administered by the FIDO Alliance. While Yubico helped develop the standard, it is not the only company that produces security keys, so it’s wise to shop around. A lot of what makes buying a security key tricky is first figuring out which device(s) you plan to use it with. Yubico offers different keys for devices with USB-A, USB-C, or NFC connections, while Google offers one that uses Bluetooth. You should also check out whether your apps support the U2F standard. (Yubico has a … [Read more...] about The best hardware security keys for two-factor authentication
Apple has long touted its iOS ecosystem for both the security and the tightly controlled approach the company has taken with its App Store, overseeing the approval of more than 2 million pieces of software to date for its mobile marketplace. But I’ve known for years that there are ways around that process, either by jailbreaking or by misusing what are known as enterprise certificates, which are designed for large companies to distribute apps internally that let you directly install software on an iPhone. Still, I was as shocked as anyone to find what amounted to a bizarro world App Store of sorts sitting in plain sight, downloadable with a few taps on my iPhone XS. The marketplace, called TutuApp, is just one of many illicit iOS app stores that can be easily sideloaded onto your Apple device, so long as you’re willing to hand the keys to your security and privacy to an unknown, likely China-based entity designed around peddling popular Nintendo knock-offs and pirated … [Read more...] about This alarmingly well-made illicit iPhone app store has been hiding in plain sight
Breaking News Emails Get breaking news alerts and special reports. The news and stories that matter, delivered weekday mornings. SUBSCRIBE Feb. 14, 2019, 2:14 PM GMT By Reuters Software pirates have hijacked technology designed by Apple Inc to distribute hacked versions of Spotify, Angry Birds, Pokemon Go, Minecraft and other popular apps on iPhones, Reuters has found. Illicit software distributors such as TutuApp, Panda Helper, AppValley and TweakBox have found ways to use digital certificates to get access to a program Apple introduced to let corporations distribute business apps to their employees without going through Apple's tightly controlled App Store. Using so-called enterprise developer certificates, these pirate operations are providing modified versions of popular apps to consumers, enabling them to stream music without ads and to circumvent fees and rules in games, depriving Apple and legitimate app makers of revenue. By doing so, the pirate app distributors are … [Read more...] about Loophole allows pirated apps to be installed on Apple iPhones