• Subscribe to Newsletter
  • Advertise
iTWire iTWire iTWire
  • Home
    • About iTWire
    • About iTWire - Advertising, Sponsored Posts, Editorial & Press Releases
    • About our News site
    • Advertise in Newsletter
    • Advertise on iTWire
    • Advertising Specs
    • Advertorials
    • Commswire Subscription
    • Contact CEO
    • Contact Editor
    • Current Webinars
    • Interviews
    • iTWire News Site Editor
    • Lead Generation
    • Newsletter Editor
    • Our Journalists
    • Press Releases
    • Promotional News
    • Reviews
    • See Latest Newsletter
    • Commswire Newsletter Example
    • Sponsored News
    • Webinar Promotion
    • Zoom Interviews
  • Your Tech
    • Browse News
      • Mobility
      • Home Tech
      • Wi-Fi
      • Apps
      • Internet of Things
    • Entertainment & Gaming
  • Business
    • Browse News
      • iTWire Marketing
      • Networking
      • Open Source
      • Security & Cybersecurity
      • Business Telecommunications
      • Enterprise Solutions
      • Print Solutions
      • Hardware
      • Storage & Cloud Storage
      • Business Software
      • Cloud
      • Data Analytics & Artificial Intelligence
      • Data Centres
      • MVNO
      • Managed Services
      • Accounting Software
      • Business Intelligence
  • Industry
    • Browse News
      • Deals
      • Channel News & Partnerships
      • Cloud Accounting
      • Enterprise Cloud
      • Virtualisation
      • Web Development & Front-End Development
      • Telecoms & NBN
      • Manufacturing & Logistics
      • Web Hosting
      • VoIP
      • Strategy
      • Listed Tech
      • Market
      • Application Performance
      • CRM & Contact Center Apps
  • People
    • Browse News
      • Career Coach
      • Recruitment
      • Not For Profit
      • Education & Machine Learning
      • People Moves
      • CIO Trends
      • Enterprise Staff
      • Remote Working
  • GOVT
    • BROWSE NEWS
      • Government Tech Policy
      • Technology Regulation
      • Technology Tenders
      • Local Government
  • Science
    • Browse News
      • Energy
      • Climate
      • Health
      • Biology
      • Automotive
      • Space
    • Water Resources
    • Environment
    • Mining here
  • Opinion
    • Browse
      • Apexing the Linux learning curve
      • ShrinkAge
      • The Big House
      • Fuzzy Logic - Alex Zaharov-Reutt
      • Seeking Nerdvana
      • Open Sauce - Sam Varghese
      • A Meaningful Look
      • Transit
      • Business Intelligence Blog
      • ShawThing
    • Browse
      • Stephen Withers
      • Whiskey Tango Foxtrot - David Heath
      • Linux Distillery - David M Williams
      • UNI-verse
      • Radioactive IT
      • Cornered!
      • Beerfiles
      • ICT Energy and Sustainability
      • Wired CIO - David M Williams
      • C Level
  • Reviews
    • Browse
      • Computers & Peripherals
      • Smartphones & Mobile Devices
      • Software
      • Networking
      • Books
      • Games
  • Guest Articles
    • Guest Opinion
    • Guest Reviews
    • Guest Interviews
    • Webinars & Online Events
    • Guest Research
    • Company News
  • CHANNELS
  • ITWIRE TV

Total: 130 results found.

Search for:
Search Only:
1. 10 ways to stay cyber secure during the coming holiday season
(Guest Opinion)
... devices may be infected with malicious code that can cause significant damage and disruption. 10. Enable two-factor or multi-factor authentication Adding 2FA or MFA to your security mix can significantly ...
Created on 12 December 2022
2. 6 Most common online threats for gamers
(Guest Opinion)
...  Axie Infinity maker, Ronin, reported that hackers stole in-game assets worth $625 million from the blockchain-based game in July 2022. This is the biggest crypto heist of all time.  Solution: Caution/2FA/Strong ...
Created on 01 November 2022
3. Hitachi Vantara sees object storage growth explode as organisations seek data driven advantages
(Company News)
COMPANY NEWS: Demand for Hybrid Cloud Storage with Data Intelligence and Automation Drive Cloud Object Storage Adoption Hitachi Vantara, modern infrastructure, data management and digital solutions ...
Created on 17 October 2022
4. Roku unveils a line of new smart home products
(Home Tech)
... security capabilities that include two-factor authentication (2FA), user data encryption, secure boot, and other protection settings. Integrated with Roku OS, users will be able to receive real-time ...
Created on 17 October 2022
5. Secureworks State of the Threat Report 2022: 52% of ransomware incidents over the past year started with compromise of unpatched remote services
(Remote Working)
GUEST RESEARCH: Secureworks (NASDAQ:SCWX), published its annual State of the Threat Report today, revealing that the exploitation in remote services has become the primary initial access vector (IAV) in ...
Created on 10 October 2022
6. New global survey from Yubico finds 59% of employees still rely on username and password as primary method to authenticate their accounts
(Guest Research)
... 2FA codes to the attacker – all within a few seconds. She discussed the evolution of cyber attacks and the importance of deploying modern MFA, like a YubiKey, to stop attackers in their tracks during a ...
Created on 29 September 2022
7. Mobile business messaging market to reach US$78 billion by 2027: report
(Mobility)
The total value of the global mobile business messaging market will increase from US$48 billion in 2022 to US$78 billion by 2027, according to a new research report. The research conducted by Juniper ...
Created on 06 September 2022
8. Qualcomm eyes stake in Arm, CEO says
(Strategy)
US chipmaker Qualcomm wants to buy a stake in Arm alongside its rivals, CEO Cristiano Amon told The Financial Times. The Financial Times reports that Qualcomm is interested in investing alongside its ...
Created on 03 June 2022
9. Security starts with the developer - GitHub to mandate 2FA by end of 2023
(Open Source)
... of 2FA before the end of 2023. Supply chain attacks can inject security vulnerabilities into tools and libraries and code, which can then be installed far and wide. GitHub recognises this, and its ...
Created on 13 May 2022
10. Tech for Good: the key to protecting vulnerable populations
(Guest Opinion)
... cybersecurity methods such as mobile authentication apps, one-time passcodes (OTPs), and two-factor authentication (2FA) are increasingly susceptible to common online threats. Multi-factor authentication ...
Created on 21 April 2022
11. NFT, Metaverse jobs boom, sharp fall for Bitcoin projects in Q1 2022: Freelancer.com
(Listed Tech)
Freelancing, crowdsourcing ad online job marketplace Freelancer.com has released its quarterly Fast 50 index for Q1 2022 which reveals that based on data from 351,000 jobs posted on its website during ...
Created on 19 April 2022
12. Malicious Android apps target Malaysian bank customers, warns ESET
(Security)
... can get into their victims’ bank accounts, the fake e-shop applications also forward all SMS messages received by the victim to the operators in case they contain Two-Factor Authentication (2FA) codes ...
Created on 07 April 2022
13. VIDEO Interview: Yubico's Geoff Schomburgk talks the myths of mobile authentication, hybrid work, biometric keys and more
(Security)
...  In the video interview below, we also talk about another article from the blog, titled "A Day in the Life: Dispelling the Myths of Mobile Authentication," which explains why traditional methods of 2FA ...
Created on 24 February 2022
14. iTWireTV Interview: Yubico's Geoff Schomburgk talks the myths of mobile authentication, hybrid work, biometric keys and more
(Guest Interviews)
...  In the video interview below, we also talk about another article from the blog, titled "A Day in the Life: Dispelling the Myths of Mobile Authentication," which explains why traditional methods of 2FA ...
Created on 24 February 2022
15. Norton's 2022 Cyber Safety Report: Aussie online daters do background checks, while hours are wasted resolving cyber crime issue
(Home Tech)
... find it, remove it and protect yourself? Often, to install stalkerware of creepware, access to your device is needed. To protect yourself best, ensure you have 2FA (2-Factor Authentication) or biometric ...
Created on 14 February 2022
16. GitHub Mobile now offers secure 2FA to protect your GitHub account
(Security)
GitHub continues its ongoing investment in account security and developer experience by adding a 2FA mechanism in GitHub Mobile on iOS and Android. This provides another authentication option alongside ...
Created on 27 January 2022
17. Mixed messages: Busting Box's MFA method
(Guest Opinion)
... redirects to: /2fa/verification. The attacker, however, does not follow the redirect to the SMS verification form. Instead, they pass their own factor ID and code from the authenticator app to TOTP verification ...
Created on 21 January 2022
18. CES 2022 VIDEO: The Targus range of antimicrobial 'DefenseGuard' keyboards, mice, backpacks, UV-C light and mor
(Home Tech)
Although Targus won a CES 2021 award for its UV-C light, it only seems to be launching now, and isn't yet listed on the Australian site, but even so, Targus has a wide range of antimicrobial technologies ...
Created on 17 January 2022
19. COMPANY NEWS - Making the internet safer for everyone, one YubiKey at a time
(Guest Opinion)
... 150 million Google users onto its 2FA system (two-step verification or 2SV, as Google calls it), and require two million YouTube creators to activate it by November 1, 2021. Many other companies are also ...
Created on 07 November 2021
20. Tide Foundation introduces ‘cyber herd immunity’ with new deep tech security solution
(Security)
Deep tech cybersecurity start-up Tide Foundation is claiming it is curing the cyber breach pandemic with the “radical idea” of delivering 'cyber herd immunity' to any organisation. According to Tide ...
Created on 21 October 2021
21. Govt's ransomware action plan gets a lukewarm welcom
(Security)
... 2FA solutions are becoming common, yet significantly ‘enhanced MFA cyber security’ solutions are already available in the market that happen to be developed, produced and run in Australia.” Elbaum said ...
Created on 14 October 2021
22. Australian, NZ organisations fear increased security risks working from home
(Security)
... adopting two factor authentication (2FA) - while overall, multi-factor authentication (MFA) has been deployed for 73% (AU) / 71% (NZ) of remote/mobile and non-IT employees and staff. But major gaps still ...
Created on 07 October 2021
23. Massive data breach at Twitch.tv
(Security)
... is that as password hashes have leaked, all users should obviously change their passwords, and use 2FA if they are not doing so already. "But as the attacker indicated that they have not yet released ...
Created on 07 October 2021
24. Inmarsat launches Velaris connectivity solution for Unmanned Aerial Vehicles
(Business Telecommunications)
Global satellite communications provider Inmarsat has launched Velaris, its advanced new connectivity solution, to provide secure communications for commercial Unmanned Aerial Vehicles. Claiming a ...
Created on 09 September 2021
25. Facebook joins ID2020 Alliance to develop tighter security standards
(Apps)
Tech giant Facebook has joined the ID2020 Alliance, a global public-private partnership committed to shape the future of digital ID and ensure technologies are designed and implemented in ways that are ...
Created on 27 August 2021
26. Five best security practices for remote teams during COVID-19 and beyond
(Guest Articles)
... industries.  1. Two-factor authentication With two-factor authentication, sometimes called 2FA, users must finish their login with a code that gets sent to another device, typically a mobile phone. It ...
Created on 27 July 2021
27. Passwords: Your first and often weakest defence
(Business IT)
... most important accounts, especially if you don’t use them often. Turn on 2FA if you can. While two-factor authentication doesn’t guarantee your account’s safety, it stops criminals from carrying out ...
Created on 07 July 2021
28. 49% of gen Z and millennials in romantic relationships admit stalking an ex or their current partners online: study
(Security)
... to find and remove it and protect yourself moving forward. To install stalkerware or creepware, access to the device is needed. To help protect yourself, ensure you have 2FA (2-Factor Authentication) ...
Created on 25 June 2021
29. Norton finds 'nearly half of young Australians who have been in a romantic relationship admit to ‘stalking’ an ex or current partner online
(Home Tech)
... of creepware, access to your device is needed. To help protect yourself , ensure you have 2FA (2-Factor Authentication) or biometric login enabled so more than just a password is needed. In some cases, ...
Created on 25 June 2021
30. Hitachi Vantara Enhances Lumada Portfolio to Deliver Improved Resilience, Agility and Accuracy in Industrial IoT Environments
(Guest Articles)
Company News: Lumada Manufacturing Insights, Smart Spaces and Lumada Video Insights and Lumada Edge Intelligence Deliver More Robust Data Analysis for Improved Operations and Business Agility. New Supply ...
Created on 06 May 2021
31. Global cloud services market reaches US$42 billion in Q1 2021: Canalys
(Cloud)
Cloud infrastructure services spending grew 35% to US$41.8 billion in the first quarter of 2021. The trend of using cloud services for data analytics and machine learning, data centre consolidation, application ...
Created on 02 May 2021
32. How cloud technology is revolutionising the patient experience
(Health)
Company News: With the pandemic wreaking havoc on patient anxiety and distress, patient engagement is emerging as one of the most important priorities, with more health professionals increasingly turning ...
Created on 15 April 2021
33. 2021 Samsung Galaxy A-Series A32 and A52 5G range lands at Vodafone Australia
(Telecoms & NBN)
Vodafone is launching Samsung's more affordable A-Series A32 5G and A52 5G models on its Infinite plans today, with the A32 available online and the A52 both online and in stores, with Galaxy Buds Live ...
Created on 09 April 2021
34. PHP shifts to GitHub after malicious commits to own git server
(Security)
... names, as well as the permissions you're currently missing. Membership in the organisation requires 2FA to be enabled. "This change also means that it is now possible to merge pull requests directly from ...
Created on 30 March 2021
35. eftpos readies anti-fraud tools including 2FA
(Security)
Debit card system provider eftpos will launch two anti-fraud tools later this year to help make online payments more secure. eftpos's upcoming tools are network fraud scoring (to help financial institutions ...
Created on 22 March 2021
36. Holistic approach needed to tackle ransomware, say tech executives
(Security)
Good cyber defence must be a holistic pursuit and focusing only on one area risks repeating mistakes of the past, the chief executive of cyber security firm Avertro says. Ian Yip was reacting to a ...
Created on 19 February 2021
37. Ransomware: still the #1 threat affecting business, say MSPs, with cost of downtime nearly doubling
(Guest Research)
... MSPs are taking the extra step to partner with MSSPs that can offer more security-focused experience, along with a more widespread use of security measures like SSO and 2FA – these are critical strategies ...
Created on 02 December 2020
38. Nvidia makes advances in DPUs, edge AI, technical collaboration, videoconferencing and drug discovery
(Enterprise Solutions)
... as well as Nvidia technologies such as AI Pose and Audio2Face to generate photorealistic images in real time. It also allows the use of those same tools and technologies in a collaborative space. So ...
Created on 06 October 2020
39. Twitter bitcoin scams target the rich and famous, cryptocurrency firms
(Security)
... control and can intercept text-based 2FA codes. Notably, the language in the tweets was tweaked to the voice of the target." Lotem Finklestein, head of threat intelligence, at security firm Check Point ...
Created on 16 July 2020
40. API lifecycle product means you can give data to the public and be secure too, says Software AG
(Sponsored Announcements)
Interview Ian Ward - DevOps Solution Architect at Software AG International software company, Software AG, has been helping companies innovate through leveraging the power of their data for over 50 years. ...
Created on 01 July 2020
41. API lifecycle product means you can give data to the public and be secure too, says SoftwareAG
(Development)
PROMOTIONAL INTERVIEW*  Ian Ward - DevOps Solution Architect at SoftwareAG International software company, SoftwareAG, has been helping companies innovate through leveraging the power of their data for ...
Created on 01 July 2020
42. Warning: Remote working has its security pitfalls
(Security)
...  Require multi-factor authentication (MFA) Also known as two-factor authentication (2FA), this is the best defence organisations can implement on all their corporate devices to protect themselves against ...
Created on 06 April 2020
43. SMS a weak link in two-factor authentication: data guru
(Security)
... minutes - and I think this is really worth a few minutes of your time - go check all of your online accounts, make sure two-factor authentication is enabled - I'm not saying don't enable 2FA - but make sure ...
Created on 28 February 2020
44. GSMA monitoring, assessing impact of Coronavirus on events
(Business Telecommunications)
Mobile industry body GSMA says it is monitoring and assessing the potential impact of the Coronavirus on its MWC20 events held annually in Barcelona, Shanghai and Los Angeles, as well as the Mobile 360 ...
Created on 30 January 2020
45. Supply chain attacks becoming more commonplace: claim
(Security)
... using two-factor authentication, so it makes sense to ensure that your service providers are using 2FA. The code and container problem isn't so easy to deal with. Sophos uses a lot of outside libraries, ...
Created on 04 November 2019
46. Attacker gets into Avast network, apparently targets CCleaner again
(Security)
... had erroneously been kept enabled and did not require 2FA. She said the company had then halted upcoming CCleaner releases and checked prior updates to see it any malware had been infiltrated into the ...
Created on 22 October 2019
47. Govt makes 2FA compulsory for porting mobile numbers between providers
(Security)
... also mentioned the use of 2FA but went no further. In March, the ACMA announced a Scam Technology Project to look at ways to disrupt scam activity on telecommunications networks. Said Fletcher: “If ...
Created on 16 October 2019
48. FULL LAUNCH VIDEO: Yubico's world-first: a Lightning-Compatible security key lands in Australi
(Security)
... authentication protocols, the YubiKey 5Ci delivers strong multi-factor (MFA), second-factor (2FA), and single-factor passwordless authentication for a simple and seamless user experience across the entire ...
Created on 02 October 2019
49. Android malware bypasses Google's permissions restriction
(Security)
... passwords in SMS two-factor messages without using any SMS permissions. "As a bonus, this technique also works to obtain OTPs from some email-based 2FA systems," he said. The apps were built to pass ...
Created on 18 June 2019
50. ACMA warns telcos over lack of info for disability consumers
(Telecoms & NBN)
Australia’s three largest telcos have been warned by the telecommunications regulator over breaches of safeguards for consumers with disabilities. Telstra, SingTel Optus and Vodafone Hutchison Australia ...
Created on 29 May 2019
  • Start
  • Prev
  • 1
  • 2
  • 3
  • Next
  • End
  • Home
  • Latest News
  • Your IT
  • Business IT
  • IT Industry
  • NEWSLETTER
  • MAGAZINE
  • IT People
  • Government
  • RSS

Services

  • Promotional News & Content
  • Sponsored Announcements
  • Self Posting
  • JobZilla IT Jobs
  • See Newsletter
  • Our Journalists

Company

  • About
  • Contact
  • Advertising Specs
  • Advertise NOW
  • Privacy
  • Editorial Guidlines& Complaints Handling
  • Sitemap

Connect

Facebook
Twitter
Cloud Hosting by Digital Pacific