Your source for IT news and tech tips.
| A YubiKey for iOS Will Soon Free Your iPhone from Passwords | Wired | Over the last several years, Yubico has become close to ubiquitous in the field of hardware authentication. Its YubiKey token can act as a second layer of security for your online accounts and can even let you skip out on using passwords altogether. The only problem? It’s been largely unusable on the iPhone. That’s going to change soon. | AT&T Decides 4G Is Now “5G,” Starts Issuing Icon-Changing Software Updates | Ars Technica | "There's a new cellular network technology on the way. The 5G upgrade will require new modem technologies, lots of new chips to pack into devices, and the need for new and more plentiful cell towers. That all sounds like a lot of hard work, so wouldn't it be easier to just update everyone's 4G icon to '5G' and call it a day? Welcome to AT&T's 5G plan, where perception and marketing is all that matters. AT&T is just going to start calling 4G LTE '5G E,'" writes Ron Amadeo. "The company started rolling out a software update to several Android phones, and what was called '4G' yesterday is now called '5G' today." | What Does a Successful Security Program Look Like? | BetterCloud Monitor | In the era of data breaches, what makes up a successful security program? BetterCloud’s Senior Security Architect Austin Whipple shares what success and failure look like in a security program. After reading this article, you’ll come away with a few ideas you can implement right away. Here’s what he’s seen work. | New Tool Automates Phishing Attacks That Bypass 2FA | ZDNet | A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named Modlishka — the English pronunciation of the Polish word for mantis — this new tool was created by Polish researcher Piotr Duszyński. Modlishka is what IT professionals call a reverse proxy, but modified for handling traffic meant for login pages and phishing operations. |
|
|
| I Gave a Bounty Hunter $300. Then He Located Our Phone | Motherboard | T-Mobile, Sprint, and AT&T are selling access to their customers’ location data, and that data is ending up in the hands of bounty hunters and others not authorized to possess it, letting them track most phones in the country. |
|
|
| SaaS Updates Summary: January 7 – January 11 | BetterCloud Monitor | You can now embed Google Drawings files saved in Drive into Google Docs, and you can also assign unique colors to chart elements in Google Sheets. Google is adding auto-provisioning support for two new apps: monday and Proxyclick. |
|
|
|