Zoom is adding support for two-factor authentication (2FA) to its desktop and mobile applications, giving users the option of adding an extra layer of security to their account beyond a standard password. The company confirmed that all users will be able to access the new security feature, including those on the company’s free tier. Users […]
Starting 13 October 2020, Google Drive is changing what happens to the files you delete and go to trash; they will automatically be forever deleted after 30 days. This means that Drive will be on par with other Google services like Gmail for consistency. Any files already in a user’s trash on that date will […]
For every privacy minded or conscience person, they would want to keep “low profile” especially while online. And here is where VPNs or Virtual Private Networks come in. You can now have one, or more on yuor device, be it a PC, laptop, smartphone…you name it.Although you can literally use any VPN out there (free […]
Cloud computing can be defined as a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. It is now evolving like never before, with companies of […]
At least anyone using the internet and has an email address has seen or received a phishing message once or a couple of times before. I am going to talk all about it here in this blog. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message […]
Incognito mode, also known as Private Browsing, is a privacy setting that creates a new session that doesn’t save your activity to your computer. This activity may include browser history, cookies, cache, and login credentials. It allows you to go undercover when you’re browsing on the internet. Any searches or websites you visit in Incognito […]
The Internet can feel like a dangerous place these days, With hacks, scams, malware and more. The Internet-connected appliances has opened us up to even greater risks. But the good news is that by taking just a small handful of security measures we can greatly reduce our exposure to all these threats. Here are some […]
With the increasing popularity of social media platforms, security is of paramount importance. While choosing a strong password helps, 2FA improves your security further. Here is how to do just that for some of the common and most used platforms. 1. How to enable Two-factor authentication on Facebook: To enable two-factor authentication on Facebook, head […]
Two-factor authentication (usually abbreviated as 2FA) comes in different forms with some doing better than others. Hopefully you have heard about two-factor authentication, its pros and cons. Requiring something beyond just a password to unlock your online accounts makes them harder to break into. Tip: Keep in mind that two-factor authentication is different from two-step […]
App permissions govern what your app is allowed to do and access. This ranges from access to data stored on your phone, like contacts and media files, through to pieces of hardware like your handset’s camera or microphone. Granting permission allows the app to use the feature; denying access prevents it from doing so. Ever […]
- 1
- 2