BLOG

Read our blog about the latest trends on mobile computing and best practices on safe and secure computing

2-factor authentication, what’s that I can hear you say? Over? What have I missed?

2-factor authentication, what’s that I can hear you say? Over? What have I missed?

Well don’t worry as we will explain Put hopefully (very) simply, We’d strongly encourage everyone reading this post to use 2-factor authentication whenever you can.  Most online services including LinkedIn now offer account holders this extra safety feature. Why they don’t offer it by default I don’t know but that we can discuss in anotherRead more about 2-factor authentication, what’s that I can hear you say? Over? What have I missed?[…]

Who is the April Fool? 1-Step too far when 2-step is required.

Who is the April Fool? 1-Step too far when 2-step is required.

Usually, Google enters into the April 1st tomfoolery with an excellent and often funny gotcha. This year, however, they took it 1-step too far and it went badly wrong. So we would like to write about 2-step which we hope you will read. It’s really difficult to catch the public’s eye and try and offerRead more about Who is the April Fool? 1-Step too far when 2-step is required.[…]

Another e-mail SCAM – be warned.

Another e-mail SCAM – be warned.

Last revised or Updated on: 10th February, 2016, 9:39 AM An email with the subject of  Emailing: MX62EDO  10.02.2016 pretending to come from documents@dmb-ltd.co.uk  with a malicious word doc or Excel XLS spreadsheet attachment  is another one from the current bot runs which try to download various Trojans and password stealers especially banking Trojans like Dridex orRead more about Another e-mail SCAM – be warned.[…]