28 Burst results for "Six Digit"

Is It Time to Ditch Two-Factor Text Messages?

Talking Tech

01:41 min | 3 months ago

Is It Time to Ditch Two-Factor Text Messages?

"Of the most important security measures you can take turning on two factor authentication to log into various online accounts whether it's for your bank your email or your twitter account but it might be time to ditch the option to receive those codes. You get by text that's right. I'm usa today. Tech columnist rob pecoraro writes about this on dot usa today dot com exploring alternatives to rely on text messages when enabling two factor authentication. It's especially important if your t. mobile customer as a recent data breach made its customers more susceptible to what's called a sim swap attack where a hacker tries to take over a phone line to intercept two factor authentication messages and it doesn't require the hacker to physically have your phone in their possession one alternative to receiving text with a code that allows you to continue the log in process is to switch to an or app google authenticate or is one big example. I've used an app called offi h. y. for years. Now it's fantastic. I use it for several of my accounts. It's really easy to set up in. All you do is when it gets to that screen that asks for the code to put in Instead of again getting text she'll go to the offi app and pull up the account. And it'll give you a six digit code. You type it right in. There are also some apps like google bypass text message altogether instead showing a message on your screen asking if you tried signing in and then he can tap either yes or no to confirm that you can also purchase an encrypted usb security key to linked to your account and then confirmed by plugging into the new device. They usually start around twenty five dollars but can't be fooled by fishing pages and protect multiple

Rob Pecoraro Usa Today Twitter USA Google
"six digit" Discussed on Heartland Newsfeed Radio Network

Heartland Newsfeed Radio Network

01:45 min | 6 months ago

"six digit" Discussed on Heartland Newsfeed Radio Network

"It can be something simple for consumers and companies to do and make it a little bit more frustrating for attackers and nick great great points and yeah it is a little irritating sometimes but you know what if you get used to the fact that okay. I gotta have my phone nearby anyway. So i'm gonna get a code. Usually it's a six digit code. And then i'm gonna put it in my computer and then they know it's me. Well be thankful for that because if it was somebody else to log in use suddenly get a code and you say for what. I didn't request code. Well there you go now immediately go in and change your password to because they are getting that far into an account or a platform or whatever else and that's enough to let you know that there's an issue so fix it right away before it becomes a bigger issue. And where can our audience go for more info. If you want to read the report go to id and business slash threat index. Twenty twenty one. You can read about exports forces findings from last year and get some more security recommendations terrific and of course. Ibm dot com slash security. Also where you can see where. Ibm is helping to put security everywhere to help us. All thrive in the face of uncertainty. Nick your delight to chat with a look forward to getting you back because there's so much more that we even barely scratched the surface on. We want to make sure and stay on top of this. Thanks so much for joining us. Thanks for having me my pleasure. Nick rosman the global threat intelligence lead with ibm security x force and again ibm dot com slash. Security will let you see what he and his team are up to on a regular basis while you're online.

Nick rosman last year six digit ibm Nick Ibm Twenty twenty one
"six digit" Discussed on Heartland Newsfeed Radio Network

Heartland Newsfeed Radio Network

01:43 min | 6 months ago

"six digit" Discussed on Heartland Newsfeed Radio Network

"And companies to do and make it a little bit more frustrating for attackers and nick great great points and yeah it is a little irritating sometimes but you know what if you get used to the fact that okay. I gotta have my phone nearby anyway. So i'm going to get a code. Usually it's a six digit code. And then i'm gonna put it in my computer and then they know it's me. Well be thankful for that because if it was somebody else trying to log in use suddenly get a code and you say for what. I didn't request a code. Well there you go now immediately go in and change your password do because they are getting that far into an account or a platform or whatever else and that's enough to let you know that there's an issue so fix it right away before it becomes a bigger issue. And where can our audience go for more info if you wanna read the report go to and dot biz slash threat index. Twenty twenty one. You can read about his findings from last year and get some more security recommendations terrific and of course ibm dot com slash security. Also where you can see where ibm helping to put security everywhere to help us. All thrive in the face of uncertainty. Nick your delight to chat with look forward to getting you back because there so much more that we even barely scratched the surface on. We want to make sure and stay on top of this. Thanks so much for joining us. My pleasure nick. Rosman the global threat intelligence lead with ibm security x force and again ibm dot com slash. Security will you see what he and his team are up to on a regular basis while you're online be sure to hit us.

last year Nick six digit Rosman nick ibm biz ibm dot com ibm security Twenty one twenty
Georgia officials give election update in metro Atlanta's Fulton County as vote counting continues

Morning Talk with Martha Zoller

00:28 sec | 1 year ago

Georgia officials give election update in metro Atlanta's Fulton County as vote counting continues

"The poll workers are working hard there, cutting open envelopes processing about 2000 votes every hour. Taking open the envelopes, pulling out the bouts, flattening the ballots and then putting them through a scanner. We've seen really a steady trend over the past 24 hours of votes going away from President Trump. The league was six digits 24 hours ago. It's down that just about 30,000 right now there's still roughly 100,000 votes Outstanding. It's morning Talk with Martha

Martha
Biden maintains lead as key races narrow in Arizona, Georgia

The Paul W. Smith Show

01:24 min | 1 year ago

Biden maintains lead as key races narrow in Arizona, Georgia

"After election Day in some states are still counting votes while President Trump has been filing lawsuits. Here's the latest from Fox's Griff Jenkins America but county counting the results showed the president picked up some 10,000 ballots. However, he still trails behind Biden by just over four points with 84%. Of the precincts reporting in Nevada, Biden leads by barely over a half a point. But in Georgia President Trump leads by about a half a point in North Carolina, Though Trump leads by roughly a point and a half, and in Pennsylvania, the president's leading by more than 2.5 points. Here are the deadlines for ballot counting in Pennsylvania. It's November 10th. Nevada, November 12th in North Carolina in Georgia, it's November 13th. The president is calling for a recount in Wisconsin, where Biden led by less than 1%. Trump has filed legal actions in Georgia, Pennsylvania and in Michigan in Georgia. Here in Fulton County in Atlanta, the poll workers are working hard there, cutting open envelopes, processing about 2000 votes every hour, taking open the envelopes, pulling out the bouts, flattening the bouts and then putting them through a scanner. We He really a steady trend over the past 24 hours votes going away from President Trump the lead with six digits 24 hours ago. It's down that just about 30,000 right now, there's still roughly 100,000 votes outstanding reporter

Biden Griff Jenkins Donald Trump President Trump Georgia Pennsylvania Nevada North Carolina FOX America Fulton County Wisconsin Michigan Atlanta
When will the unwanted robocalls stop

The Tech Guy

06:35 min | 1 year ago

When will the unwanted robocalls stop

"I'm curious. If you've noticed any improvement in spam calls, Robo calls all of that. Supposedly, it's been taking care of. And I think it kind of has now get ready because the silly season is upon us. You may remember a couple of years ago and four years ago six years ago when. you know all the campaigns spun up. And you would get calls every day from the political campaigns and so forth. I think. My guess is at least it's been my experience of curious if it's yours, they're not calling as much as they are texting. Now I get texts like crazy tons of texts. all the time many of them panicky. Money, we're running out of money got to send US money a lot of that. You can only laugh there's no as far as a way to block text I guess you could say stop. The FCC has implemented this technology called stir and shaken, which sounds like a james bond recipe for Martinez is in fact. What they call a caller ID authentication protocol. And They have till June, thirtieth the next year to to implement it but I think some of the carriers are already starting to implement the idea is. When a call is made. It stirred. That is the originating network attached authentication information to it, and then when received by the receiving network could be the same network could be a different one. it shaken. Both. Which means they verify? It's it's It's origination. See if you're GONNA DO SPAM Robo calls or spam calls of any kind you don't really same with spam email. You know really want anybody to know who was the real origination because then they could block you. Notice has spammers changed a phone number all the time. They usually these days try to use your area code sometimes even your local exchange. So the first six digits are the ones you recognize which is I think designed to make you think maybe it's your kid calling or the kids school calling or your doctor or somebody you know you just don't know that number. So they're hoping you'll pick up and then it goes you've just won a trip to. Nowhere. Going, maybe that's what's killing them. The timeshares and the trips. That's no good anymore is maybe that's what's killing them. There's also most of the carriers now are implementing A. Spam blocking technology I. Know T mobile just turned there's on. And and I've been using for some time apple has a feature which like the iphone I think that you can do this on Android to. Seem to remember where you say if I if that phone call is not coming from a number I, know. From my phonebook. Just. Send it to voicemail. You know and if it's important, they'll leave a message and then you can add them to your phone book if you want to hear from them from now, I like that feature. So my phone hardly rings anymore. But then I'm also I'm not a big phone caller either. I prefer other means of communication mostly none. Don't bother be it. I won't bother you how about that? What is that a deal? Okay. I call my mom once a week she's hard to get a hold of now. To mom you WANNA facetime because we usually facetime. That's the other thing. I don't use a phone as much as I'll use facetime or on Google side duo, or of course, we're all using zoom in meet in teams and all the different video calling things. That's not really a phone call. That's you know that's like a data connection. I feel like it's close to Funke plus phone call with pictures. But Mom doesn't really answer when I. A texture I because you know I, don't want to surprise her. And then you know I did, yes I'm feeling sad now. She's getting me back for all the Times I didn't call her. Mom You WANNA facetime. Crickets. So the chat room. So you saying you're still getting calls from the Marriott at least every other week says Burke. I feel like I feel like the call screenings gotten good. Now remember spam email was such a problem it's not going away. Still. The vast majority of Internet. Email traffic is spam junk mail. But we but the systems to block have gotten so good now that you just rarely see it anymore right Most of the spam I see stuff I signed up for newsletters I signed up for maybe I gave him I signed up for something I gave my address and they said you, you WanNa get stuff from us and I forgot to say no one. It's mostly that we call it bacon. It's spam you asked for is baking. If you get spam, you didn't ask for that spam. Of definitely spam. Not Related to hormones pork shoulder product the Hormel people would like me mention that. They actually allow us to use the term spam at first they were like that's our brand name for a product. Can you not call? Junk mail spam. For why we call it uses that's a terrible name. You see unsolicited commercial e-mail. Who's this I got some news today yet seen no spam just works hormel finally gave up then. All right fine. Call it spam, but just don't confuse it with our fine pork shoulder products. So I won't. I won't. It's delicious. It's not like junk email at all not in any respect. So it's gotten better hasn't it? This? The junk calls. Now and just get a lot of junk texts. Solution for that yet. You know where spam came from right Monty Python. If you ever want to go if you want some fun go to youtube if you haven't seen it in the spam skit. Where the they're, they're coming to breakfast and everything's got spamming it. A lot of spam spam takes over the whole skip pretty soon, the singers commencing Spam Anti Spam, Wonderful Spam. That's the Hormel pork shoulder product they're talking about there but somebody's united just like the junk email that multiplies. We'll get. So, they call it spam and A term was born.

Hormel Facetime United States Robo Youtube FCC Apple Funke Google Martinez Burke
Multi-Stage Ransomware

Malicious Life

06:54 min | 1 year ago

Multi-Stage Ransomware

"The primary thing that we focus on is is trying to learn what the current trends are in attacker tactics and techniques how the shifting from targeting specific type of enterprises to targeting other types of enterprises. What is more popular less popular? What is the collaboration between different attack groups look like and how they leverage each other's resources and capabilities, and really the the method in which we we operate is to not assume in advance what we're going to find in that honeypot. We basically create the facade of an appealing target in a particular segment of the market, and then we cast a fairly wide net. We. Make it very apparent. That the target is there we try to make it very apparent that it is an appealing target to a specific sector of attackers, and then basically keep it up and running for a while usually a couple of months in wait and see what comes our way we deploy network of sensors within the honeypot. So we can always understand what is happening in that environment. But we try to first and foremost they hands off in terms of not making it extremely difficult for an attacker to set initial access into the environment we sort of even invite the men to a certain extent. But once they're in, that's when we start focusing on what they're doing in an exam understanding exactly how they're going through the motions what are they after? How are they doing this? Cowardly the operating and how they're running the operation what happens outside of the honeypot are they using data that they're taking from the honeypot? Anyway are the interacting with other groups based on that data and their observations? Are they bringing in other parties they're collaborating with? And so during that process, we are not completely passive. Sometimes, we would try to mimic the response of that enterprise. We would try to stop their attack to a certain extent, but really not sufficiently good enough to actually stop what they're doing just to give them the feeling that they're you know in a real world environment, it's a theater of cybersecurity. A think would be a great great name. I understand that you manage to fool some attackers at least what were they doing in the network once once the Entered it. I think the the clearest trend that we saw in this research was around. More attacks. What we saw was that. In especially when you compare it with honey pods that we ran in previous years, significantly more of the ransomware attacks on the honeypot use the tactic that has referred to as they multi-stage ransomware attack, and that specific tactic can have a major impact on large organizations basically I would say is as part of this tactic, what the attacker would do is they would. Gain access into a network, and then they would start moving into network. Before we go on on with multi-stage attack, I think we should probably create you know a baseline for our listeners. What is a single stage ransomware attack? A single state ransomware attack is essentially when the user clicks on fishing email and and the machine on which that user is is working is is you know has a ransomware infection and in multiple files usually data files get encrypted, and then that user is presented with a a ransom, a ransom demand note but those usually impact just does are we often refer to them as detonate on impact type ransomware? So the second you click on that thing, it starts running it in crypts whatever it Finds on that machine, and then at posts that ransom demand, those were classic ransomware attacks and I think over the course of the past year, we've seen a certain peak in them probably around late two, thousand, eighteen, early, twenty, nineteen, and during late, twenty, nineteen, two into two, thousand, twenty where seeing certain decline in the amount of those single stage. ransomware attacks are still very high numbers, but there's a certain decline answers a trend. So in your experiment, you're seeing a different tactic multi-stage ransomware. Correct. What we saw there the multi-stage attack tactic basically involves a situation where the attacker is is operating a hacking operation. It's a when they first start by making sure that they have access into a network that can be a user that clicks on a file, an attachment it can be in some of the ways, but once they have access to the network, they put the rent some more in there, but they don't detonated they. I, tried to maximize the impact of their attack on the target. So they can be at a place where they can have maximum leverage to gain get as much ransom payment out of that activity as possible. The way they do that, and that's why it's called. multi-stage attack is that. The first stage involves trying to. Move in the environment from that single point of entry they discover user credentials, basically passwords then they tried to use these passwords to move around the network and impact. Other systems gained control of other systems on each system that they get to. They go through the same process of they take data and they exfiltrated, they take user credentials. They put the rent some more on that impacted asset, but they don't detonate and then they keep moving in the network until they've exhausted their capability to spread across the network and the idea is to reach as much as as as important assets as possible as critical assets as possible in the network. Once. They've exhausted their capability to move around the network the detonate the ransomware that they deployed in the environment across all these impacted us at the same time. Once the ransomware has needed and there's A. Large scale denial at service, usually as as as a result of that, the follow up very commonly with a ransom demand that involves threats to expose the data that they've stolen user credentials that they've stolen, and again the ideas at that point in time to gain maximum leverage on the victim. To pay usually a ransom, some that ranges between the five and six digits in dollars.

The Twitpocolypse

Let's Talk Bitcoin!

05:03 min | 1 year ago

The Twitpocolypse

"Some time ago about a year ago, or maybe two years ago, twitter introduced time based one time passwords google authenticated as most people know that mechanism where you have an authentic eater APP on a mobile device, and that gives you six digit codes to log in as to factor, which is much more secure than SMS SMS of course can be hijacked if your Sim Card is hijacked, so a lot of people were speculating all of these different methods of attack to me. It seems unlikely that accounts that are very familiar with some checking because. Because it happens a lot in crypto and has had a lot of high profile. Reporting would have SMS. It also seemed unlikely that even if they did that, someone was able to Sim Jack phones from big accounts across two different continents, at least because some of these accounts are china-based or singapore-based, some are europe-based. Some are a us-based that involve several different phone carriers in different countries all done within a matter of hours. It seemed to me very unlikely that I would be the case so assuming that they did have hardware two factor authentication. Or at least an authentic eater op, you can't really steal a password. That's not enough. So then, if the account security is likely to be quite secure, what are the other avenues someone can get in? The next most likely mechanism of attack would be API's so twitter has API's that allow various social media, aggregate or sites to post so that whole team of people can schedule and review and posts to multiple platforms similtaneously I. Use platforms like that, too. It allows me to work with a team of people and collaborate on what we post and schedule it out in advance. So. When you see a personal message from me, his personal, but when you see an with like I'm doing this video on Saturday, you know that's scheduled in advance and it's posted automatically. Are, not sitting there, attaching images and typing in Hashtags in real time. These services of course access the twitter API using off which is a nation protocol. It's the same protocol that's us when you log into a site using your google account and it redirects. You gets an encrypted challenge response message from uses that antedates into sight. And these gain full access the twitter time and presented in some of the site. You're probably familiar with things like hoot, sweet and buffer, sensible and various other sites like that now. These sites are not always as well secured. So that was my immediate suspicion. Because from there you can easily post the message, and if that site security isn't a strong with two factor, etc, I assumed. had been compromised than because there are only a handful of social media postings services eight. It was quite possible that all of these disparate companies were using the sang. Then the attack continued to escalate. One of the things that was noticeable was that the tweets that will come out? Were saying twitter web APP. Now when you have an off service that is posting remotely through the API. It has a clear identifier, says twitter for iphone, says hoot suite, it says some social media, posting or something like that. It doesn't say twitter web up. So my immediate suspicion was that this was a browser extension again much easier to compromise it. Browser extension that is a common single point of failure across all of these different accounts, and would have access to twitter web API to post on behalf or maybe sore credentials for users. There are a lot of sloppy browser extensions out there and then people started talking about the possibility of zero day browser exploit now. That'd be a very serious problem. Because Zero Browser, exploit effectively means that someone was compromising browsers through some click through mechanism, revolt, execution, or something like that and hijacking credentials from inside the browser secure store. That's a very serious. Because I would affect not just twitter, but then again it was only happening on twitter. And why would you use a zero day? Browser exploit that can be enormously powerful to hack only one site twitter, and then to use it to do this silly. Nigerian scam. I'm using the term Nigerian scam because Nigerians have anything to do with us, but because this type of scam originated with the Nigerian Prince Story, I mean it's a story, actually the we've seen repeat over and over and over again for two decades exactly I was reading through some kind of gaming coverage of this and many of them are likening it to scams that. That have been pulled in Yvonne Line, which is a popular sort of Laissez Faire, M., o. and ruined scape, also, which is really like a mostly for kids type of environment, and again like seven years ago. Apparently there was a rash of this type of give your money and I'll give you double back and again of course in crypto currency. We've seen this since.

Twitter Google Laissez Faire Yvonne Line
Apple and Google's coronavirus contract tracing APIs, explained

The Tech Guy

02:55 min | 1 year ago

Apple and Google's coronavirus contract tracing APIs, explained

"Apple and Google have created a they call it an API An interface to their the Bluetooth Ellie in their most recent phones android and Ios doesn't work in all phones but it works on you know enough funds. They've created a What they believe is a privacy forward way of contact tracing. This is an issue as we start to emerge from our quarantine. We're GONNA WANNA know. Somebody's sick who they ran into. And this system is quite clever. Quite a clever system. And you'd expect that some of the most clever engineers in technology working on it from apple and Google they They came up with something that Will ship out to most phones. Maybe we already have. I think we might already have it. They said the middle of the month and then in some few months down the road. They're going to do applications but what they what. They were hoping that health officials in various countries would take advantage of this. Germany wanted to I ap France wants to France said but but But you are. You are getting away because you don't let us Takes the information of Fun Apple? Said you can use the Bluetooth. Eli's kind of cool because you know how you says pair it. Here's a six digit number. All that security stuff which by the way is not very secure but that's a conversation for another show Bluetooth L. E. Didn't even do that. It just says hi. I'm here where are you? Oh Hi nice to meet you. And the original use of it was something called beginning was for advertising. It walk into a gap and the Levi's table was over here over here. Hi Leo. I've got some Levi's on sale in your size which would be disconcerting. All with that pop up right on your phone would know you would know your size. All that they. Nobody took this up by the way museums. A few museums because you get next to the Mona. Lisa says you are standing in front of the Mona Lisa. Yes it is rather small. Isn't it and so that was you know museums use it but it didn't really take off. They announced this years ago. Well now Now it does take off. It makes sense because as you walk through your life out of quarantine out in the world every time you get within somebody reaches somebody else's phone it sends you a little token not associate with their personality. Not who they are not their name address phone number just a little token the changes every ten minutes and you'll collect those throughout the day and if at any time you test positive. The healthcare worker gives you a little. Qr Code scanning to the phone. The phone then notifies everybody. We're in contact with over the last whatever number of days so very clever system without giving up privacy right doesn't say who you are doesn't say who they are. It just knows

Apple Google France Mona Lisa Mona Levi Lisa ELI LEO Germany
Don't Be Like Jeff Bezos. Here's How To Keep Your Phone Safe From Hackers

Weekend Edition Sunday

03:41 min | 2 years ago

Don't Be Like Jeff Bezos. Here's How To Keep Your Phone Safe From Hackers

"This week we learned that Amazon founder Jeff Bezos allegedly had his phone hacked by the crown prince of Saudi Arabia malicious code was supposedly hidden inside a message sent to basis from the prince's what's apt account now we should say we don't yet know for sure how businesses phone got hacked and Saudi Arabia denies it but all of this got us thinking if Jeff Bezos can't keep his phone safe can the rest of us we're joined now by NPR as Chris Arnold to answer that question hi Hey Lou all right you and I presumably don't have security as good as Jeff basis what can we do rates there are good things I'm sure about being Jeff phase a bad thing about being Jeff pays us that was that people with a lot of money and resources are trying to hack his phone but the good news is the rest of us we probably do not have to worry about a super sophisticated expensive targeted hack something tells me there's some not so good news for us who are not Jeff phasers world yeah the hackers are using more generic low cost now we're against us the good thing about that though is that even if some of that gets into your phone phone security is getting better and it's very unlikely that that's gonna let the hackers like open up all your apps in like we'll hear all of the packing up and get the account number also and here's why I talked to Matthew green a computer science professor at Johns Hopkins every single app you have runs in what's called a sandbox basically the isolated from all the other apps on the phone so even if there's a bug in one app yes it's possible that that could lead to something bad to Mao were being installed that affects them out but generally speaking it won't spread throughout your phone and so that's that's kind of the protection that phones have have added to make these acts much more difficult so that sand box sounds good right but don't hackers always find some new vulnerability that they're going to exploit yeah that that's always possible and he's also a big important safety to it from green so you don't make that too easy for them he says some people do what's called jailbreaking their phones and you could do that like install games that you can't get the regular apps store and if you jailbreak your phone a lot of these good protections disappear and so it's like you're taking off your digital armor and leaving yourself wide open to attack so do not jail break your phone is what you do it don't make your phone alright let's talk about this thing called Sims swapping it sounds scary what what is that all right the short version of this is the bad guys trick the phone company to transfer your phone number from your phone to a phone that day half and then once they get that they can get your passwords reset by getting that little six digit thing gets zapped at their phone and they're like oh you recall reset password and pretty soon there at all your bank accounts and everything is still a lot of money we spoke to Sammy to rise he is an investigator with the Santa Clara county district attorney's office here's the set so we highly recommend that people not use their cell phone number as a form of verification of identity and then there's alternative two factor authentication methods that are that are free or you can use the security questions but this interesting he says make up fictional answers that you'll remember so that people can't research the answers to those questions but the bottom line in all this is you know whether it's a phone hacker something else our personal data can get stolen and all kinds of ways we have to be vigilant and to ride this is like you put a credit freeze to black anybody from opening new credit cards new accounts in your name that's always a good idea indeed all right that's NPR's Chris Arnold breaking it down thank you so much you're

Jeff Bezos Saudi Arabia Amazon Founder
"six digit" Discussed on KFI AM 640

KFI AM 640

03:01 min | 2 years ago

"six digit" Discussed on KFI AM 640

"Service like one driver outlook dot com you'll still need the Microsoft authenticator that's how they authenticate but for everything else Google Facebook Twitter you can use a standalone authenticator program they often say Google authenticator is again get Google authenticator Mister there is a Google authenticator but you don't have to use that one they all work exactly the same way they take the current time of day they mush it together with the secret number that is yours and yours alone kind of like your password and give you a six digit code that changes every thirty seconds the one I recommend I told don about is called off the it's free a U. T. H. Y. and it's awesome that's a member off the is awesome and if it puts all your codes in there you can have many many accounts with all your authenticator codes and and so when it asked for Cody just open off the on your phone you go to that account and it says all your six digit code is and then it knows that as as you and that changes every thirty seconds I did also tell box doesn't like to Russian by then it's almost twenty eight seconds no you don't have to rush you get theirs the battle slot because times are perfect right people of different types so you got a minute sell at get do this turn this on on Facebook for sure Twitter for sure the most important thing if you use Google is Google especially fuse email you don't want anybody stealing your email accounts or get off the a U. T. H. Y. put on your phone the nice thing about off the reason I recommend offi over Google authenticator Microsoft thank you is because you can create off the account this is all free and when you have got to count it keeps track of all your secret codes they're crafted so no one else can see them not even the creators of off either cryptid but that way if you lose your phone or get a new phone you can sign into your off the account affiant type in your encryption password and you've got your codes back so that's always a concern if you're using two factor you don't want to lose that second factor that'll make it hard to get it that's the point makes it hard to get in the account so if you really care about privacy and security and you really don't want anybody ever to get into your Google mailer or any of these accounts turn on to factor most of these companies give you variety your password manager that's another good one I use LastPass but whatever password manager you use that's a really important one because if somebody could get into your password vault they have all your passwords so turn on to factor in that and any good password manager will give you a variety of choices including Google authenticator if they say Google authenticator say yeah that's okay but use offi a U. T. H. Y. and if they offer you you'll be key or a foot sometimes they call it a fight too that's the that's the standard the fighter to standard fighter UTF standard if they are you UDF if they offer you that and you and you're willing to carry around a low key a little dongle on your keychain that's the best if you you know you've seen the movies were they going to the vault in the mountain with the nuclear codes are kept you know you've seen the movies they go in you have to do a hand print you have to do an iris scan you have to enter a code the.

Microsoft Google thirty seconds six digit twenty eight seconds
Six Digits discussed on Morning News with Manda Factor and Gregg Hersholt

Morning News with Manda Factor and Gregg Hersholt

00:19 sec | 2 years ago

Six Digits discussed on Morning News with Manda Factor and Gregg Hersholt

"Week you cannot file a claim to get your share of a settlement from the Equifax data breach of twenty seventeen about a hundred forty seven million people or do a portion and figuring out if your one of them is easy the website Equifax breach settlement dot com is now up and running you just enter your last name last six digits of your social security number to see if

Six Digits
"six digit" Discussed on News 96.5 WDBO

News 96.5 WDBO

02:38 min | 2 years ago

"six digit" Discussed on News 96.5 WDBO

"It a lot easier to keep tabs on where your devices you have a number of apps that allow you to track the location we got em spy in life three sixty but here's the deal they also have it in your android if you got an iPhone you have so the whole find my iPhone and that's fabulous so anytime you might want to lose your phone even in the house you can go and find it number two is you want to change your phone password now by default apple is no longer requiring four digit pans out now you get a six digit pin on android you want to go into your security location and that's where you want to have a pattern in lieu of password I can be even harder for an intruder to gas I number three in our list as you turn on guided access on your iPhone or screen pinning on your android here's what it is sometimes the most interesting people on your phone in the people close to you that your kids so who hasn't handed their phone to a board trial just keep them entertained now if you have an iPhone there's a way for you to restrict what the kids or anyone else with access to your phone can do it's called guided access on android you can also lock your phone to specific apps with screen pending this is also really handy when you want to hedge somebody your phone Hey you want to see this picture or here's video that I took number four on our list is to use remote right being in case of emergency let's say you lose your phone and you're like oh what do I do now I get everything on it well on apple there's a way for you to sign on to the I. cloud erasure iPhone and then on android you have to first have find my device you download that and then you register your phone on it and then you can go ahead and just wipe your device remotely five in our list is really important a VPN or virtual private network you should always have that honor phone especially for using public wifi we tell you how to get it which one we recommend and finally use a ferret a bag that locks are if ID signals like what's a fair in a bag as the special bag that actually goes back to the origins electric engineering but it's applicable to a range of fields from nuclear defenses digital privacy and basically what it does is that it prevents all the radio waves like Rick like cell phone signals and so you have it in that bag nobody can have access to your phone and in case you're wondering Hey that's a really great how can I learn more well silly look no further than the official homepage of the Kim commando show that's commanded a calm of course when you're there at that show pics button right on the homepage alright still to come this hour Cooper useful iPhone feature that you probably never used before but once I tell you what he really now I got it and we're your phone calls you're on the cam commando show help.

four digit six digit
"six digit" Discussed on WIBC 93.1FM

WIBC 93.1FM

02:39 min | 2 years ago

"six digit" Discussed on WIBC 93.1FM

"It a lot easier to keep tabs on where your devices you have a number of apps that allow you to track the location we got em spy in life's three sixty but here's the deal they also have it in your android if you got an iPhone you have so the whole find my iPhone and that's fabulous so any time you might want to lose your phone even in the house you can go and find it number two is you want to change your phone password now by default apple is no longer requiring four digit pans out now you get a six digit pin on android you want to go into your security location and that's where you want to have a pattern in lieu of password that could be even harder for an intruder to gas I number three in our list as you turn on guided access on your iPhone or screen pinning on your android here's what it is sometimes the most interesting people on your phone in the people close to you that's your kids so who hasn't handed their phone to a board trial just keep them entertained now if you have an iPhone there's a way for you to restrict with the kids or anyone else with access to your phone can do it's called guided access on android you can also lock your phone to specific apps with screen pinning this is also really handy when you want to have somebody your phone Hey you want to see this picture or here's video that I took number for a list is to use remote writing in case of emergency let's say you lose your phone and you're like oh what do I do now I get everything on it well on apple there's a way for you to sign on to the I. cloud in the race for iPhone and then on android you have to first have find my device you download that and then you register your phone on it and then you can go ahead and just wipe your device remotely five and this is really important a VPN or virtual private network you should always have that honor phone especially for using public wifi we tell you how to get it which one we recommend and finally use a ferret a bag that locks are if ID signals what severity bag as the special bag that actually goes back to the origins electric engineering but it's a clickable to a range of fields from nuclear defenses digital privacy and basically what it does is it events all the radio waves like Rick like cell phone signals and so you have it in that bag nobody can have access to your phone and in case you're wondering Hey that's a really great how can I learn more well silly look no further than the official homepage of the Kim commander show that's committed a calm of course when you're there in that shopping center right on the homepage alright still to come this hour a super useful iPhone feature that you probably never used before but once I tell you about a real like now I got it and we're your phone calls you're on the cam commando show help staying up to date in the digital.

four digit six digit
"six digit" Discussed on News Radio 690 KTSM

News Radio 690 KTSM

02:38 min | 2 years ago

"six digit" Discussed on News Radio 690 KTSM

"It a lot easier to keep tabs on where your devices you have a number of apps that allow you to track the location we got em spy in life's three sixty but here's the deal you also have it in your android if you got an iPhone you have so the whole find my iPhone and that's fabulous so any time you might want to lose your phone even in the house you can go and find it number two is you want to change your phone password now by default apple is no longer requiring four digit pans out now you get a six digit pin on android you want to go into your security location and that's where you want to have a pattern in lieu of the password that could be even harder for an intruder to gas I number three in our list as you turn on guided access on your iPhone or screen pinning on your android here's what it is sometimes the most interesting people on your phone in the people close to you that your kids so who hasn't handed their phone to a board trial just keep them entertained now if you have an iPhone there's a way for you to restrict with the kids or anyone else with access to your phone can do it's called guided access on android you can also lock your phone to specific apps with screen pinning this is also really handy when you want to hedge somebody your phone Hey you want to see this picture or here's video that I took number for a list is to use remote right being in case of emergency let's say you lose your phone and you're like oh what do I do now I get everything on it well on apple there's a way for you to sign on to the I. cloud into ray's rifle and then on android you have to first have find my device you download that and then you register your phone on it and then you can go ahead and just wipe your device remotely five on our list is really important a VPN or virtual private network you should always have that honor phone especially for using public wifi we tell you how to get it which one we recommend and finally use a ferret a bag that locks are if ID signals life what's a fair a bag as a special bag that actually goes back to the origins electric engineering but is applicable to a range of fields from nuclear defenses digital privacy and basically what it does is that it prevents all the radio waves like Rick like cell phone signals and so you have it in that bag nobody can have access to your phone and in case you're wondering Hey that sounds really great how can I learn more well silly look no further than the official homepage of the Kim commando show that's commander dot com of course when you're there at that show pics button right on the homepage alright still to come this hour a stupor useful iPhone feature that you probably never used before but once I tell you what a real like now I got it and we're your phone calls you're on the cam commando show help staying up.

four digit six digit
"six digit" Discussed on KOA 850 AM

KOA 850 AM

02:22 min | 2 years ago

"six digit" Discussed on KOA 850 AM

"To keep tabs on where your devices have a number of apps that allow you to track the location we got em spy in life's three sixty but here's the deal they also have it in your android if you got an iPhone you have so the whole find my iPhone and that's fabulous so anytime you might want to lose your phone even in the house you can go and find it number two is you want to change your phone password now by default apple is no longer requiring four digit pans out now you get a six digit pin on android you want to go into your security location and that's where you want to have a pattern in lieu of password I could be even harder for an intruder to gas a number three in our list as you turn on guided access on your iPhone or screen pinning on your android here's what it is sometimes the most interesting people on your phone in the people close to you that's your kids so who hasn't handed their phone to a board trial just keep them entertained now if you have an iPhone there's a way for you to restrict with the kids or anyone else with access to your phone can do it's called guided access on android you can also lock your phone to specific apps with screen pinning this is also really handy when you want to hedge somebody your phone Hey you want to see this picture or here's video that I took number for a list is to use remote right being in case of emergency let's say you lose your phone and you're like oh what do I do now I get everything on it well on apple there's a way for you to sign on to the I. cloud erasure iPhone and then on a hundred you have to first have find my device you download that and then you register your phone on it and then you can go ahead and just wipe your device remotely five in a list is really important a VPN or virtual private network you should always have that honor phone especially for using public wifi we tell you how to get it which one we recommend and finally use a ferret a bag that locks are if ID signals like what's a fair in a bag as the special bag that actually goes back to the origins electric engineering but it's applicable to a range of fields from nuclear defenses digital privacy and basically what it does is that it prevents all the radio waves like Rick like cell phone signals and so you have it in that bag nobody can have access to your phone and in case you're wondering Hey that's a really great how can I learn more well silly look no further than the official homepage of the Kim commando show that's committed a calm of course when you're there at that show pics button right on the homepage.

four digit six digit
How to get your Instagram account back from hackers (The 3:59, Ep. 572)

The 3:59

04:28 min | 2 years ago

How to get your Instagram account back from hackers (The 3:59, Ep. 572)

"The. Welcome. I'm forgetting, it's the grams testing some new features that could make it harder for hackers to city your count, and hold them for ransom over you have the story. What's, what's this about? Yeah. So a lot of the times, hackers target, you know, Instagram accounts from influencers, or anybody, that has, like a cool username, that's only like three letters long or something like that, and sell it for like pretty high prices, a report from the Atlantic few months ago, talked about how these accounts can oftentimes sell for, you know, one hundred thousand dollars or something like that. But I've also known average people that are not celebrities at all that they're in scramble counts hacked, and it's extremely hard to get it back, most of the time because when you ask to get your password back, they'll send it to an Email address. But the problem is once somebody has your Email has your Instagram. They can change what Email addresses associated with right. And they'll hold it for ransom. Sometimes they'll say, if you want your account back, give one hundred two hundred dollars whatever is that what it goes for obviously, for a celebrity Yam count. It's worth a lot more. But it's average Joe like how much is it? It's like an average person about that much, you know, varies, if you have a really popular account, it could cost a lot more than that, considering how much influencers make from advertise post and things like that. But what Instagram is testing out is these features. So when you try to log in now, if you if you can't get your password, right? Obviously because a hacker might have changed it. They can you can now ask them to send the six digit code to your original Email address. So the one that you signed up for Instagram with which is which can't really change, and they can send it there. Once it goes there and use the six digit code to log, log back on. They will log out all other logging sessions. So then, you know, the hackers on their devices, they'll be locked down. They won't be able to get back in that way. So this is something that's been coming for a long time here. We're getting hacked on Instagram for a while. Now they really haven't done much for victims. But this is a good way to prevent that from happening. How I mean how prevalent is this like how many how many of these? How common is it for you to actually get your account hacked and held for ransom while there's no statistic on it, but last August Instagram did acknowledge in post on their own blog saying, like we've noticed, you know, a rise in this, we've noticed more people complaining about this, but they didn't really offer a solution, then they more. So just gave the standard fare of user strong password and used to factor authentication, which isn't really, you know, proactive on this kind of thing, so. Yeah. Okay was good to hear the Instagram's actually taking some proactive moves to, to help users next Euphemia with world of warcraft ever. Chris quest. Yeah. Used to play a lot of. Wow. And then I stopped because I had other things to do. Well, these massive online roleplaying games, they were kind of the exception, I guess they were sort of there are couple these a handful of these games back in the day. But now it's quickly become the norm. You've got you know games like anthem. You've got games like see the's course four night. These are games that. Expect to go on forever as and host of the annual update of the franchise using reliant DLC relying on. The ability purchase digital goods upgrades. How do you feel about that? Because if this is a, this is sort of a way to our bleed you of your money more. I mean they don't have to make a whole new game. And it's they save money that way, also people get new content without having a bye straight up new game subscription fees associated with that. And they can just keep making money that way without as much of the work. I mean obviously like all games, no matter how good they are like we'll stale and they'll make like a new one eventually Yalo to was supposed to last forever. Also. And it kinda got stale. And then they came out dabble with three, which is also really good, same thing. Doda dodo is a game that lasted a really long time and then they came Doda to destiny is a good example. Yeah. Go on for why then. Well destiny. Also didn't have the best eventually get stale. What do you think four nights? We're not gonna there's going to be a fortnight to eventually, like, I there's no doubt that there will be. All right. Last. Check out our latest feature. With gives you an inside. Look at he's smart home. Custom built for wounded veteran slice reminded that tech is just about the shine new gadgets, can actually change lives in a real meaningful way. More of these stories are under Chiang. I'm out. Frank listening.

Instagram Atlantic JOE Chris Quest Frank Yalo Six Digit One Hundred Two Hundred Dollar One Hundred Thousand Dollars
"six digit" Discussed on The Tech Guy

The Tech Guy

03:47 min | 2 years ago

"six digit" Discussed on The Tech Guy

"And somebody. You must be using by now goodness knows I've been telling you about them for a long time. I've been using them for even longer more than a decade. You know, what I'm talking about last pets last pass is a password manager everyone needs. We all have too many passwords, and the problem is the way we deal with that. Most of the time the way people solve the problem passwords is not the right way. But the wrong way the easy way. They make up passwords that are easy to. Remember they use passwords again. And again, these are very dangerous behaviors if a site gets cracked, and they get your password, they can get into all those other sites and passwords that are easy to remember are almost always easy to brute force, you need to generate long, strong, cryptographic -ly secure passwords, and then you need to store it in a cryptic graphically secure container. That's in a nutshell. What last past us now last has been around a long time. And so they have a lot of nice additional features, including the ability to generate passwords the ability to us to factor that occasion, highly recommended we use last pass at work because not only do I wanna be secure with my passwords, but I know our employees ease have access to our databases are Bank accounts are websites everything, and I want them to be secure as well. Right. Because the last thing you want is a is a breach. So we. Make sure they use last pass enterprise. We make sure they do right because there are over one hundred policies including and we insist on this two factor. Authentication we have minimum standards for the last past password. Masterpass word, we have all sorts of great ways of restricting including in some cases, employees, for instance, who have access to our Bank accounts. Don't actually get the password. They click Lincoln last past logs, the men, but they never see the password that means they can't share it. And by the way, one thing we do know is employee share passwords sometimes often with people not even at the same place of work. You gotta have last pass the number one. Most preferred password manager trusted by over forty three thousand businesses last past has thirteen and a half million regular users to it's the best password solution for you and your team whether it's last pass premium for individuals last past family. So we use it home makes it easy to share passwords with my wife. She's also my designated emergency access. That's really important last past supports that if anything should happen to you. They've got lots of precautions, but she can get access to my passwords if I'm incapacitated. That's last past families. There's also last pets for teams of fifty or fewer and the last pass enterprise. That's what we use. They have a great authenticate or app, which sends push notifications doesn't give you six digit numbers. That's greater employs love to use that I actually used my last pass with a Yuba key. And this is the ultimate and security. Yuba key is a cryptographic Lee secure key store that is a one time password for last pass. That's awesome. You gotta use last pass. If you've got passwords, and who doesn't these days, you gotta have last past another reason, I love it. It's the first at by stall on my new thing pen when I get into Friday. First thing I do is install last best on any new phone last past and that facilitates its auto Fillon logging into all the other apps and getting all the other stuff setup. So it's it to me last pass is key. You find out more about last pass? Join the thirteen and a half million last pass users including everybody at twit at last past dot com slash twit. Thank you last pass for making a great product. And for supporting our tech guy podcast last past dot com slash twit. Leo LaPorte the tech..

Yuba Leo LaPorte Lincoln Lee six digit
"six digit" Discussed on The Tech Guy

The Tech Guy

01:46 min | 3 years ago

"six digit" Discussed on The Tech Guy

"Pez. I started using them when they first came out ten years ago. And now, he's it for my business to because if you think about it, you know, you may have great password practices because you listen to me, you know, you've got you've got all wired. But if you have a business, you know, your -ployees doing things you wish they didn't like. Passwords on post it notes on the screen or worse. Most employs do this share passwords not just with people in the company. But with others last pest is awesome. You don't even have to give employs a password. They press a button in their last past logs in they don't know the password. So that means you can change it. If an employee leaves, you can restrict access fact, you get over a hundred policies, plus actionable should security reports you can create shared folder. So the business office. Here has one folder are engineers have another fuller. We call it the ops. Folder. They get access to the stuff they need, but not access to everything. Engineers don't know. What's going on business business? Doesn't know what's going on engineering, and nobody has access to my passport. That's how we want it. Last pass is the way for an enterprise to protect itself to keep track of passwords to generate new long strong passwords, and one of the things we enforce one of those policies we enforce to factor, then occasion. Last past supports every form. Yuba key duo security Google cater effect. Even have their own authenticate or you don't have to use it. But they have it which I like because unlike the six digit authenticates it pops up a notice on your screen that says you try to log into the Bank approved deny just a button. It's very very easy to use. I go on and on. But really if you think about it last pass may be the most important security thing, you can do in your business. That's why forty-three thousand businesses use last pass the best password solution for.

Yuba Google six digit ten years
"six digit" Discussed on Security Now

Security Now

02:07 min | 3 years ago

"six digit" Discussed on Security Now

"It's not what you want. What you want is last past. It's not only the number one. Most preferred password manager used by sixteen and a half million people in over forty three thousand businesses. It has the features you want as an administrator to insist for instance, you can set master password requirements, you can require two factor. We buy I should say we been using less enterprise for years. I started using last best when I came out more than a decade ago. I've been using it personally, Steve his, you know, uses it. He's talked about it before on the show, you go back and listen to previous security now here his discussion of last pass in our interview with Josie grist, the creator of last pass, so. It it stores. Passwords securely and safely. Passwords are only decrypted at the device level. So it's pet last pass has no access to your passwords to any of your information period. Boom, it it. We used to factor. We required to factor. You can use Yuba keys duo keys. You can use a thin caters last past has their own authenticated. That instead sending a text message or a six digit code actually puts an approved deny button on the user's phone. That's actually, great employees. Get it. You know, they say, okay, you're logging into our Bank account. Okay. Now approved on your phone. They pick up their phone. They do it. That's good strong to factor. That's built in the last past last pass has a pass regenerator to which means they can generate good long strong passwords and share them easily with other important people in the company, you can even create password folder sharing folders. So everybody in the business office has access to the same passers, Dev or whatever, and we do that we use the folder. Like crazy. You can also make it. So they don't see the passwords. So we know employees will share right? A passer down put it on a post it note to share it with friends, we even know employees frequently share passwords outside the business. This. They won't even know the password, they not only they cannot change it. They can't see it. But they still can get into the asset. You need him to get into we trust last pet so much. We we'd store everything in there. Not just the Bank the keys to the Bank account, the keys to the web server the SSH Loggins.

Josie grist Steve his administrator Loggins six digit
"six digit" Discussed on Security Now

Security Now

02:07 min | 3 years ago

"six digit" Discussed on Security Now

"It's not what you want. What you want is last past. It's not only the number one. Most preferred password manager used by sixteen and a half million people in over forty three thousand businesses. It has the features you want as an administrator to insist for instance, you can set master password requirements, you can require two factor. We buy I should say we been using less enterprise for years. I started using last best when I came out more than a decade ago. I've been using it personally, Steve his, you know, uses it. He's talked about it before on the show, you go back and listen to previous security now here his discussion of last pass in our interview with Josie grist, the creator of last pass, so. It it stores. Passwords securely and safely. Passwords are only decrypted at the device level. So it's pet last pass has no access to your passwords to any of your information period. Boom, it it. We used to factor. We required to factor. You can use Yuba keys duo keys. You can use a thin caters last past has their own authenticated. That instead sending a text message or a six digit code actually puts an approved deny button on the user's phone. That's actually, great employees. Get it. You know, they say, okay, you're logging into our Bank account. Okay. Now approved on your phone. They pick up their phone. They do it. That's good strong to factor. That's built in the last past last pass has a pass regenerator to which means they can generate good long strong passwords and share them easily with other important people in the company, you can even create password folder sharing folders. So everybody in the business office has access to the same passers, Dev or whatever, and we do that we use the folder. Like crazy. You can also make it. So they don't see the passwords. So we know employees will share right? A passer down put it on a post it note to share it with friends, we even know employees frequently share passwords outside the business. This. They won't even know the password, they not only they cannot change it. They can't see it. But they still can get into the asset. You need him to get into we trust last pet so much. We we'd store everything in there. Not just the Bank the keys to the Bank account, the keys to the web server the SSH Loggins.

Josie grist Steve his administrator Loggins six digit
"six digit" Discussed on AppleInsider Podcast

AppleInsider Podcast

03:29 min | 3 years ago

"six digit" Discussed on AppleInsider Podcast

"Seventh and third characters are no one does it's absurd and all that breaks password managers, which are good good product because password managers will generate the password for you. So that you don't have to. So you don't have to remember it student. You know, reuse passwords, you know. And all of that comes to point out. The fact that passwords are kind of a bad way of doing security to begin with. Yes. I I loved one password. I think he's one of the most use that. Right. But it's a patch on what is bad activity to begin with. It's a tool for a necessary. Yeah. I tell you what let's forget it. That's a battle passer measures. And I'll help you out. You just tell me your password. I remember it for you. No. No. No. So so the questions are there. Other ways of identifying a user that are not related to remembering strings of characters. You know, your your phone is your phone, right? One imagines. Yes. Unless it's a company found out to try to make this too complicated. But desert company phone is actually very relevant L use it in ten seconds from now I products I'm getting there. I know where you wanna go with this. And I'm going to get there. But the the if if your computer is your computer, and it's your user account, right? Then that's got a fingerprint. It's got a fingerprint based on the hardware. It's got a fingerprint based on the software that you have installed. It's got a fingerprint based on your user behavior based on it kind of thing. And so it's possible to take those as a profile and use that instead of a password. The same is true for your phone it because these things are personal devices. Now it breaks for the I wanna use someone else's public computer to log into things. But there are different approaches to identity, and we haven't solved at all and end mostly we haven't even tried to solve it because we're still stuck in this idea of let's use passwords, and then let's do SMS based authentication which is. Indigenously stupid and unsafe or two factor. Authentication where it's the best instance of that is a six digit number that's generated on some other device you own and we just trust because you have both devices on you that you might be that person might maybe not. It's it's a difficult thing now with corporate owned devices, which you just mentioned. Corporate owned devices have corporate owners in corporate owners want to control those devices, and they want to do that for security. If you lose your device, they wanna be able to reset it. Right. They want to be able to ensure that the network connection between that device is secure. So they'll use a VPN or virtual private network. And they want to be able to distribute software to their employees devices and to it all the same and not have to do an app store or have an app store account. They just want to be able to to pre load them with the tools that those people need and pre configure them because configuring your own Email is kind of a pain, right? They can just preloader profile. So that the emails already set up on your phone. Guess I'm has such only because everybody who's got a corporate Farren despises. It's because it's always two versions of IRS guy. The apps are the ones they wouldn't choose to use an all of this is I feel a lot height bound rather than enabled by it. But the principal. Yes. Absolutely. Right. Right. But so here here's the thing about that ID departments. Have competing goals and their their goal is to.

principal Farren IRS ten seconds six digit
"six digit" Discussed on The Tech Guy

The Tech Guy

02:57 min | 3 years ago

"six digit" Discussed on The Tech Guy

"That's what we use. And we had to use it because one of our employees, very nice guy. Couldn't remember his passwords. So he made a webpage of public webpage with all of our company passwords on it. So after we changed all the passwords started using last pass. So that the employees can keep track of passwords can generate good long strong passwords. They only have to remember the last passive all password. And last past keeps your passwords encrypted everywhere, except on device that means no last pass employees can get to your passwords. It's trust. No one no one, but you can unlock those passwords you can share passers with actually sharing the password. You have to rate it on a piece of paper. You don't have to Email. You don't have to text it it actually shared in last pass since all the employees have access we actually use. How we use? We have a folder for ops folder for business. They're all the passwords. They need her in there. So all the people who are on the ops team the operations team get it. They, but they don't see it. And they can't change it. They you see dots. Right. So they clicked Lincoln opens the site logjam in done. That's how you do it. So they don't even have access to the password. Last pass enterprise can do all sorts of great things, you could set master actually have a hundred policies things like set masterpass requirements, we enable password resets restrict access to people when needed. We check. It also encourages good password hygiene, they have a security check. So if you reuse passwords, they'll tell you where you were used it. So you can change them unique passwords everywhere when an employee forgets a password, we can reset it. And and Furthermore, they can share that passer. We change our passwords regularly and encourages employees to do that. Because it's very simple. They change the password put in last past everybody has access to it. The last past password generator is Primo. It does such a good job creating passwords of any length that are completely random. And you don't have to remember them last pass has authenticate her. Of course, it supports multi factor. Fact, we were quite one of the policies we require everybody in the company us to factor that occasion it works with you bikinis with duo security with Google Thana cater. There's last past it has its own authenticated, which I really like is not a six digit code. It. Just puts an approved an I up on the user smartphone. That's the new way of doing it. And I'm really a fan of that. No typing in numbers. It's more secure that way. I just think it's great. If you use active directory Microsoft's active directory in your company, you can use that log in as your L S pass credential. Log in I have last pass at home we use last pass families in the family, partly because of the password sharing capability of last past families. And you can when you log into last when I log into last pass enterprise. It also logs into my last past family. So I have access to my passwords and the company passers, they don't mix, but I always have access to everything I need..

Primo Microsoft Lincoln Google six digit
"six digit" Discussed on The Tech Guy

The Tech Guy

02:57 min | 3 years ago

"six digit" Discussed on The Tech Guy

"That's what we use. And we had to use it because one of our employees, very nice guy. Couldn't remember his passwords so made a webpage of public webpage with all of our company passwords on it. So after we changed all the passwords started using last pass. So that the employees can keep track of passwords can generate good long strong passwords. They only have to remember the last passive all password. And last past keeps your passwords encrypted everywhere, except on device that means no last pass employees can get to your passwords. It's trust. No one no one. But you can unlock those passwords you can share passers that actually sharing the password. You have to rate it on a piece of paper. You don't have to Email. You don't have to text it it actually shared in last pass says all the employees have access we actually use. How we use? We have a folder for ops folder for business. They're all the passwords. They need her in there. So all the people who are on the ops team the operations team get it. They, but they don't see it. And they can't change it. They you see dots. Right. So they click the link to open the site logs them in done. That's how you do it. So they don't even have access to the password. Last pass enterprise can do all sorts of great things, you could set master actually have a hundred policies things like set masterpass requirements, we enable password resets restrict access to people when needed. We it also encourages good password hygiene, they have a security check. So if you reuse passwords, they'll tell you where you were used it. So you can change him. A unique passwords everywhere when an employee forgets a password, we can reset it. And and Furthermore, they can share that passer. We change our passwords regularly and encourages employees to do that. Because it's very simple. They change the password. Put in last pass everybody has access to it. The last past password generator is Primo. It does such a good job creating passwords of any length that are completely random. And you don't have to remember last pass has authenticate her. Of course, it supports multi factor. We were quite one of the policies, we require everybody in the company us to factor that occasion it works with Yuba keys with duo security with Google Thana. Cater. There's last past it has its own authenticated, which I really like is not a six digit code. It. Just puts an approved an eye up on the user smartphone. That's the new way of doing it. And I'm really a fan of that. No typing in numbers. It's more secure that way. I just think it's great if you use active directory Microsoft's active directory and your company you can use that log in as your last pass credential. Log in I have last pass at home we use last past families in the family, partly because of the password sharing capability of last past families, and you can when you log into last when I log into last pass enterprise. It also logs into my last past family. So I've access to my passwords and the company passers they don't mix, but I always have access to everything I need..

Primo Microsoft Yuba Google six digit
"six digit" Discussed on Security Now

Security Now

02:09 min | 3 years ago

"six digit" Discussed on Security Now

"But keeping access to your precious corporate data secure you get complete oversight. We for instance, require that everybody who uses last pass enterprise everybody who works for us uses to factor. Thana -cation, by the way, there's all sorts of ways you can do that it will work with a Yuba key with the duo security. You can use last passes authenticate or app on your phone. I like that one because it doesn't give you a six digit number just says approve or deny you can use Google cater. If you want you can use a combination of them last pass is awesome. You can set masterpass requirements. So that people you know, employees they're going to want to use monkey one two three. You could say no it has to be longer and stronger, you can enable password resets people forget, that's okay. You you can reset their password. And when somebody leaves the company, you can restrict access I love it. Because you don't even have to give employs passwords you. They can log in without ever knowing the password, which means they can't share it. They can't give it away. They can't write it down. They can't put it on a post it note on their screen every employee has their own secure vault. And I by the way, one of the great things about last past, and we make this available to everyone of our employees. They all have their own personal version of last past last past comes in a variety of flavors last past personal or premium for personal use last pass families. For families. That's actually what I use at home last past teams for fifty or fewer and the big boy last pass enterprises. We we use here. Everybody at the company gets their own last pass personal as well as past premium, and what makes it really great is you can link the two so that I have access to both my personal and our business passwords without having to re log in or log out that makes it so convenient and yet each is kept separate and crypto separately from each other. But there there's there's so many reasons. Well, here's another one if you're a Microsoft active directory house, you can use your Aideed credentials to log in the last past so complete single sign on you're gonna love last pass. And I want you to try it last pests teams for teams of fifty or fewer last past premium for personal use last pass families for the entire family. And of course, what we use last.

Thana -cation Yuba Google Aideed Microsoft six digit
"six digit" Discussed on The Tech Guy

The Tech Guy

03:23 min | 3 years ago

"six digit" Discussed on The Tech Guy

"Leo. How're How're you? you doing? I'm well, how are you? Oh, pretty good. I got a security question for you. Okay. Ok-? I have to factor identify authentication on most of my accounts that are critical some of them don't allow me to use the application, and they send the SMS instead. And you only concern I have with that is that if I plug in my phone number, then when then if they say, well, if you need to reset your password, all they do send you this code on SMS, which I think is kind of the seating the purpose. You are you are exactly right. Your intuition is correct. And by the way, it's a good thing to remember. And they, you know, there's always this tradeoff between security and convenience and companies wanna be secure. And you know, we know how to make a hundred percent secure, but they don't wanna make that would make it very inconvenient. So so they try to balance it and the companies that deal mostly with consumers will often I think air on the side of convenience. And so text messaging to factor is one example of this on the other hand is not a huge. But let me explain what what can go wrong. And and incidentally, this is something to remember if if they're using an app like Google cater for the two factor. But they fall back to text messaging, then it's exactly as insecure as just using text messaging because. Yeah, if you think about it, a bad guy's gonna say, well, I don't have the air, but I know how to hack this SMS. So let's just do that. And that's the weakness of text messaging for your second factor. So I might take a step back here for people who listening. What are they talking about? You know, when you log into something like, let's say your Bank, something you really wanna keep secure. Do you use your name, by the way? It's always a good idea to use an obscure name, not your obvious name. Maybe an obscure Email, maybe a special Email Ukraine for that reason being that's also something the bad guy has to know. Right. So if it's just your name, all the bad guy, probably knows that if he's trying to get. Your Bank account. So us be absorb obscure as possible in every respect. So you use your name your password? That's something, you know. And in most cases, that's all you do. Right. The problem is of course, you might write that down put it on a posted no next to the screen or maybe you don't use such a good password. Maybe your password is monkey one two three. Which is the first thing, by the way, the first thing the bad guys gonna guess, and they have all sorts of software brute force attack, tools that let them attempt the most commonly used passwords. So there's all sorts of ways that a weak password can be a problem to make it a little bit stronger. And this is all about proving, you are you who you say you are you can use another factor. Three factors. You can use to prove you are who you say, you are something, you know. And you only know something you have don't you only have you know, in the old days. It was a little dog oil a little something you put on your key chain that would show a six digit number or maybe a credit card sized thing that would show. Oh, maybe you use a little dog to get into the office to tap the door that kind of thing that's something. You have something physical. The third factor is something you are your fingerprint your face ide-, something you are so something. So if you combine two of the three passwords something, you know, plus an authentication code the.

Leo. Google Ukraine hundred percent six digit
"six digit" Discussed on Windows Weekly

Windows Weekly

02:09 min | 3 years ago

"six digit" Discussed on Windows Weekly

"Lose access to everything you get over one hundred policies, plus actionable security reports I like the shirt folders feature. That's a great way to add somebody to you know, you got a new employee and that person's working in the business office. They get shared to the passwords. You know, the the the accounts that are business related that's in the business folder. They don't get the passwords. They just get the access to those accounts. It's awesome. We put everything in their database Loggins. I keep my SSH keys in there. Yes. The the public and the private case software licenses. I keep my pa- my personal blast past has my passport. My driver's license. Social security numbers. All the business information in business every employee has their own secure vault for managing and accessing their passwords. In fact, we give all our employees a personal version of last best that they can merge in. In the there, there's discreet. So you don't you know, nobody else gets access to them. But you only have to log in once and you get both your business and your personal passwords that kind of encourages them to use. It gets them used to it. We think that's really important there's a password generator. So you generate unique random passwords, and you don't have to remember them. You don't have to write them down. And you don't reuse them. They're unique to each password. That makes it so easy. The auto fill functionality on IOS twelve on Android makes its at the first thing I installing any new computers last pass because from then it's easy to set. Everything else up. Multi factor as I mentioned really important last pass has a variety of MFA options, even that, you know last pass cater app, which is great because it's not a six digit number. It just says approve or deny on your phone. You say yes being the same second layer of authentication helps ensure unauthorized use won't gain access employees can also log into last pass with your Microsoft active directory credentials, which is really nice if you're eighty house because then you don't have to have an extra password. It's all done once. Last pass is built on zero knowledge that means data's encrypted and decrypted only on the device lasts past doesn't have access to any data at all..

Loggins Microsoft six digit
How to: Get used to X-style iPhones

Talking Tech

03:43 min | 3 years ago

How to: Get used to X-style iPhones

"Talking tech is brought to you by wicks dot com with wicks you can use artificial design intelligence to create a stunning website right from your phone in five minutes or less. Just go to wicks dot com. That's W I X dot com and create your professional website today. Perhaps you've been using one of the older iphone models like six seven or eight. And you just on yourself with the shiny new iphone ten our ten s model minus the home button. But plus new security system and features what to do where to get started. You've come to the right place. Okay. So the new phones that apple introduced in two thousand seventeen with a ten and continued in two thousand eighteen with the ten s tennis mats antenna are have different look than the classic iphone with edged Ed screen and elimination of the home button for navigating. When you I turn on the new iphone apple will walk you through the lengthy setup process transferring data from the old phone wirelessly, just by putting the two phone side by side, the wifi. You'll be guided through setting up the face, I d security system, which uses your face instead of a thumbprint apple paid pair your credit card with the phone to pay for goods with the device, and you'll be urged to choose a strong passcode don't be like Tania west and not for the easy to hack zero zero zero zero zero zero we recommend a six digit word that means something to you like orange and use the digits that go with the letters say backward. Once you're set up and ready to go moving around without the home button is not hard. You just swipe to get where you want to be three moves that will take some getting used to closing windows making screen shots and powering off the phone all different from before. Here's what to do closing the windows. This takes a series of swipes to do the trick start by swiping up from the bottom of the screen poss- slightly in the middle of the screen, then swipe right or left to find the app. You wanna close then swath? I took on the apps preview to close the app screen shots press and hold the button on the right side of the phone, click, the volume up, but nonetheless side, then released the buttons powering off, hold either of the volume keys in the side button until the option to power the phone appears release it once the option appears than drag your finger across you can turn the phone back on by holding down the side button have questions about the new ten series of iphones. Look for me on Twitter. Why match Everson grandma? I'll be happy to help you out. You've been listening to talking tech. We subscribe to show on apple podcast show Institure, which helps more people find the show and as always, thanks. Talking tech is brought to you by wicks dot com. When you're ready to get your website up and running you want to be able to do it quickly and efficiently and wicks dot com has got you covered. They developed artificial design intelligence that creates a stunning website for you with wicks, you can create your own professional website right from your phone, which means you can open your own online store portfolio or blog wherever you are. How's that for efficient? Just go to wicks dot com. Decide what you need a website for pick your style at your own images link your social accounts and just like that your website is ready. You look amazing on every device desktop and mobile and it takes less than five minutes. Plus, you can do it with one hand. So it's time to get started. Go to wicks dot com. That's W I X dot com and create your very own beautiful professional website today.

Apple Tania West Everson Grandma Twitter Five Minutes Six Digit One Hand