Two-Factor Authentication (2FA) Demystified

- Posted in IT Security by
You try to log into your favourite social media platform and enter your username and password, only to be greeted with that dreaded message: "An email has been sent to your inbox." Now, you've got to navigate to your email client, wait for the validation token to arrive, and finally get back to what you were doing. It begs the question: Why the extra hassle? Shouldn't a password be sufficient? [...] Read more

No, blurring images is not secure

- Posted in IT Security by
Hands up, we've all been there. You make a quick screenshot using your tool of choice, only to realize something sensitive lurks in the background. No problem, just blur it out, right? Easy fix. If I [...] Read more
Page 3 of 3