Developers May Gain Access to More Data Collected by Alexa

We discussed surveillance devices that people voluntarily bring into their homes at last night’s meeting. One of the threats we mentioned was that any data collected by a private entity can be obtained by a government entity with a court order or warrant. Another threat is that the rules regarding how data collected is handled…

Read More

Twitter Finally Offers App-Based Two-Factor Authentication

Enabling two-factor authentication is one of the best ways to improve the security of your online accounts. Most websites that offer two-factor authentication have opted to use either the Time-based One-time Password Algorithm (TOTP) or HMAC-based One-time Password Algorithm (HOTP), which are used in conjunction with an application such as Authy or Google Authenticator to…

Read More