Google tackles password weaknesses with two-step sign-on Google addresses questions about the security of its cloud-based products in announcing a new two-step log-in process that aims to strengthen the password security model by adding a dynamic layer. Read more Should Intel decide what software we can run? Intel has a brilliant new idea to make our computers safe: dictate what software we're allowed to use. Read more Calculating the true cost of cybercrime Deb Shinder looks at several studies that have sought to quantify the cost of cybercrime. She presents the difficulties associated with it -- and the challenges it poses for adequate law enforcement. Read more |
No comments:
Post a Comment