Yubico is showing off an upgraded security key that requires your fingerprint to activate the device. The YubiKey Bio marks the first time the company will offer a security key with built-in fingerprint authentication. Yubico has been previewing the device at Microsoft's Ignite conference as a way for enterprise customers to unlock access to their Azure Active Directory accounts. Although security keys are pricey ($20 to $50), they offer the best protection to stop hackers from hijacking your online accounts. Anyone logging in will need to supply both the password and insert the hardware-based security key into the computer's USB port to gain access. The technology is particularly resistant against cybercriminals based hundreds of miles away, who have no way to physically steal a key. But what happens if you lose the key, or it gets stolen by a mischievous co-worker or even a spy? Well, then you might be in trouble. It's why users of security keys typically have several backups on … [Read more...] about Yubico Unveils Security Key With Built-In Fingerprint Reader
Computer security software
They will never sit on your desk, and they will most certainly never fit in your pocket. Today, they’re fragile, and need to be kept at temperatures close to absolute zero. Quantum computers aren’t much like the desktop PCs we’re all so familiar with—they’re a whole new kind of machine, capable of calculations so complex, it’s like upgrading from black-and-white to a full color spectrum. Lately, you’ve been hearing a lot about quantum computing. There are news stories about how it “could change the world” and “open new dimensions.” Universities are hyping up their quantum microchip prototypes, demonstrations of quantum mechanical ideas in silicon, and other devices and theories. But come on, how does it work? What does it do? Who’s doing it? And, most importantly, why should you care? Despite what you’ve heard, right now, quantum computing is more or less in the era that classical computing was in the … [Read more...] about What the Hell Is a Quantum Computer and How Excited Should I Be?
The other day I was way from home and my house alarm went off. I couldn't get home to check it and it was driving me nuts. Thankfully a family member was nearby and was able to go check on the house for me. But this got me thinking, if it happens again, what's the easiest way for me to check on what's going on without waiting for a neighbor or the alarm company to check it out. I had a couple of webcams, a computer, and my iPhone. I thought, surely I can figure out a way to use these to see whats going on at home from wherever I am. Here's what I came up with. Advertisement It turns out that there are an absolute ton of apps out there that let the iPhone or iPad view your webcams over WiFi and a smaller amount that will do it over 3G, but there are even fewer that offer a way to view multiple cameras and offer a clean, easy to use interface. The app I settled on is iCam ($5, iTunes). iCam supports regular USB connected cameras as well as WiFi enabled remote cameras that are on your … [Read more...] about How to Create a Remotely Viewable, Motion-Sensing Home Security System with Your iDevice and Spare Webcams
Microsoft released the final version of its security baseline configuration for the upcoming Windows 10 and Windows 10 Server build 1909 editions. One feature that had been introduced in the draft version of the security baseline was Exploit Protection, but Microsoft seems to have taken that out, along with the explicit enforcement of 30-day account password expiration for domain-joined devices.Microsoft provides various configuration capabilities for Windows 10 and Windows 10 Server editions meant to be used by enterprise workers. According to the company, the security baseline was created based on feedback from Microsoft security engineering teams, product groups, partners and customers.One of the main security capabilities that was introduced in the new security baseline for Windows 19 1909 was the Exploit Protection feature. The feature can help mitigate certain targeted attacks, but it can also cause some problems with legacy applications -- and enterprises do love their … [Read more...] about Microsoft Removes Exploit Protection From Windows 10 1909 Security Baseline
Helpdesk and IT support staff should find this scenario familiar: a user with a desktop, a laptop, a netbook, a smartphone, and a computer or two at home wants a way to keep their files synchronized across all of them at all times. The rise of cloud services and the bring-your-own-device phenomenon have only reinforced the need to have access to everything from anywhere at all times. Offering networked storage, VPNs, and collaborative tools like SharePoint can help to alleviate the problem, but these services often lack the automation, reliability, and simplicity that end-users demand. Many cloud services exist to fill this gap, but in so doing expose sensitive data to what many would consider an unacceptable risk. SpiderOak is an attempt to solve those problems by combining the security associated with internal filesharing options with the power of cloud-based file-syncing products. For most individuals, cloud-syncing software is a great answer to the synchronization problem. The … [Read more...] about SpiderOak: Dropbox for the security obsessive
There are employers and IT departments out there that take an extreme approach to monitoring what the staff gets up to on company-owned equipment. You may not be able to change the policies of the firm that you work for, but you can at least check if and how you’re being watched. Obviously, we can’t provide a one-size-fits-all guide as we’re not privy to the inner workings of every single company out there, but we can tell you some of the best methods for finding out whether or not your computer has any spyware on it, and what your options are for dealing with it. Advertisement Whether or not you think this is fair, under US law it’s certainly legal for employers to monitor employees on company hardware, even down to the keystroke, if necessary. While it’s certainly polite for employees to be notified of the monitoring that goes on, this is only required in some states—so it might be happening without your knowledge. Presumably, if you’ve … [Read more...] about How to Find Spyware Your Employer Installed on Your Computer and What to Do About It