AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Cara melihat file orang lewat wifi9/23/2023 ![]() Grup ini juga melakukan tindakan penyerangan terhadap hotline Anti-Terorisme Inggris dengan membut telepon-telepon palsu yang terus berbunyi selama 24 jam (1 hari) sebagai bentuk protes terhadap ekstradisi tersangka teroris di US. 'Whenever there has been a big event in the media a hacker has tried to take advantage of that and use either the excitement or the concern around those events to trick users,' McArdle said. Beware of grifters The Yahoo hack has a lot of people talking and panicking, and cybercriminals will use that against you. 'Everyone should be switching two-factor authentication wherever it's available.' And if you're using a service that doesn't offer two-step, McArdle says you should demand it. ![]() 'For a hacker, having a username and a password is all you really need when there's no two-factor authentication,' McArdle said. This adds a second method of authenticating your identify after you type in a password, usually by sending you a code through a text message or an app. Enable 2-step verification If the service you're using has two-step verification - and Yahoo does - turn it on. ![]() These generate strong passwords for all your accounts and store them securely, so you only have to remember one, albeit complicated, master password. ![]()
0 Comments
Read More
Leave a Reply. |