Page 9 - 1702
P. 9

Interesting Internet                                  This post answers some of the most common
                                                               questions about two-factor authentication. If
                                                               you haven't started using two-factor authenti-
         Finds – September 2016                                cation yet, and you should be using it, check
         Steve Costello, Boca Raton Computer Society           this out for answers to your questions about it.
         editor@brcs.org
         http://ctublog.sefcug.com/                            3 Videos to Help You Be #CyberAware

         In the course of going through the more than          https://www.consumer.ftc.gov/blog/3-videos-
         300 RSS feeds, I often run across things that I       help-you-be-cyberaware
         think might be of interest to other user group        This post from the FTC (Federal Trade Com-
         members.                                              mission) contains three videos:

         The following are some items I found interest-                      · Protect Your Computer from
         ing during the month of September 2016.                             Malware

         The Flaw in Secure Logins                                           · Public Wi-Fi Networks

         http://askbobrankin.com/                                            · Tech Support Imposter Scams
         the_flaw_in_secure_logins.html
                                                               **********
         Bob Rankin talks about some flaws in two-
         factor secure logins.                                 Most Fridays, more interesting finds will be
                                                               posted on the Computers, Technology, and
         Top 10 Ways to Secure Your Mobile Phone               User Groups Blog:

         https://blog.malwarebytes.com/101/2016/09/            http://ctublog.sefcug.com/tag/interesting-
         top-10-ways-to-secure-your-mobile-phone/              internet-finds/

         Malwarebytes talks about ways to secure your          The posts are under Creative Commons li-
         mobile phone.                                         censing.

         How To Create Strong Passwords: 6 Expert
         Tips For Online Safety
                                                              Virtual Reality & Aug-
         http://www.geekersmagazine.com/create-               mented Reality
         strong-passwords-expert-tips-online-safety/
                                                              Explained
         To be secure online you need to use strong
         passwords. This post gives you tips about cre-
         ating them.                                          By Sandy Berger, Compu-KISS
                                                              www.compukiss.com
         What Is Email Spoofing & How To Protect              Sandy (at) compukiss.com
         Yourself & Stay Safe
                                                              If you want to be up-to-date in the high tech
         http://www.thewindowsclub.com/email-                 world you need to understand the terms VR
         spoofing                                             and AR. They are both amazing technologies
                                                              that are quickly moving into our everyday
         This post explains how an email can look like        world.
         it comes from a trusted place, but is actually
         from somewhere quite different. It also tells        Preface
         you how to identify this and what to do to stay
         safe.
                                                              It has always been a joy to be transported to a
         Common Questions About Two-Factor Au-                different time and place. The Greeks, Ro-
         thentication                                         mans, and American Indians did this for their
                                                              listeners by telling wonderful stories. These
         https://www.telesign.com/blog/post/common-           story tellers transported their listeners to alter-
         questions-about-two-factor-authentication-2/         native realities. With radio we were immersed
                                                                                                (Continued on page 11)

                                                             9
   4   5   6   7   8   9   10   11   12