Page 9 - 1702
P. 9
Interesting Internet This post answers some of the most common
questions about two-factor authentication. If
you haven't started using two-factor authenti-
Finds – September 2016 cation yet, and you should be using it, check
Steve Costello, Boca Raton Computer Society this out for answers to your questions about it.
editor@brcs.org
http://ctublog.sefcug.com/ 3 Videos to Help You Be #CyberAware
In the course of going through the more than https://www.consumer.ftc.gov/blog/3-videos-
300 RSS feeds, I often run across things that I help-you-be-cyberaware
think might be of interest to other user group This post from the FTC (Federal Trade Com-
members. mission) contains three videos:
The following are some items I found interest- · Protect Your Computer from
ing during the month of September 2016. Malware
The Flaw in Secure Logins · Public Wi-Fi Networks
http://askbobrankin.com/ · Tech Support Imposter Scams
the_flaw_in_secure_logins.html
**********
Bob Rankin talks about some flaws in two-
factor secure logins. Most Fridays, more interesting finds will be
posted on the Computers, Technology, and
Top 10 Ways to Secure Your Mobile Phone User Groups Blog:
https://blog.malwarebytes.com/101/2016/09/ http://ctublog.sefcug.com/tag/interesting-
top-10-ways-to-secure-your-mobile-phone/ internet-finds/
Malwarebytes talks about ways to secure your The posts are under Creative Commons li-
mobile phone. censing.
How To Create Strong Passwords: 6 Expert
Tips For Online Safety
Virtual Reality & Aug-
http://www.geekersmagazine.com/create- mented Reality
strong-passwords-expert-tips-online-safety/
Explained
To be secure online you need to use strong
passwords. This post gives you tips about cre-
ating them. By Sandy Berger, Compu-KISS
www.compukiss.com
What Is Email Spoofing & How To Protect Sandy (at) compukiss.com
Yourself & Stay Safe
If you want to be up-to-date in the high tech
http://www.thewindowsclub.com/email- world you need to understand the terms VR
spoofing and AR. They are both amazing technologies
that are quickly moving into our everyday
This post explains how an email can look like world.
it comes from a trusted place, but is actually
from somewhere quite different. It also tells Preface
you how to identify this and what to do to stay
safe.
It has always been a joy to be transported to a
Common Questions About Two-Factor Au- different time and place. The Greeks, Ro-
thentication mans, and American Indians did this for their
listeners by telling wonderful stories. These
https://www.telesign.com/blog/post/common- story tellers transported their listeners to alter-
questions-about-two-factor-authentication-2/ native realities. With radio we were immersed
(Continued on page 11)
9