The two-factor authentication is only beginning to gain traction among the technology landscape, but Yahoo is already on its way to killing it, besides the password.
News
The cyber sharing bill is one step closer to becoming a law, what it means for you
For the government to help the private sector safeguard its critical IT infrastructure from cyber attacks, a cyber data sharing approach is deemed necessary. This lays the foundation for the Cybersecurity Information Sharing Act, which recently passed the Senate. But privacy advocates have a different view of the bill, likening it to the controversial surveillance […]
Most important legal technology developments
Assuming that legal professionals are unable to embrace technology is often exaggerated. Although they have never been at the helm of tech innovation, it has undoubtedly changed the way they practice law – for the better.
TextSecure no longer encrypts your SMS, what to do?
Following the revelations of Edward Snowden on a surveillance program run by the National Security Agency to spy on individuals’ online activities and communication, a host of SMS encryption services became an in-demand product. But TextSecure, one of the pioneers in this area, is dropping support for encrypted text messages.
Cryptocurrency mining software forcibly installed in computers of uTorrent users
If you are using uTorrent to download files from the Internet, chances are that your computer might have been infected with a cryptocurrency mining software, a kind of bloatware that steals bitcoins and other digital currencies from a computer.
Adobe kicks off vulnerability disclosure program without incentives
We have seen the rise of bug bounty programs in many large tech companies as a result of the growing threat landscape that, if unchecked, would bring tremendous damage to critical infrastructures and businesses.