Wednesday, August 29, 2012

What Is Two-Factor Authentication, And Why You Should Use It

Two-factor authentication (2FA) is a security method that requires two different ways of proving your identity. It is commonly used in everyday life. For example paying with a credit card not only requires the card, but also a PIN, a signature, or an ID. With 1FA becoming increasingly unreliable as a security measure, two-factor authentication is rapidly gaining importance for logging into online accounts. Read more

Microsoft Office 2013: On-Demand Desktop Office Applications On Any Computer [Updates]

One of the novel features that the guys from Redmond hope to debut with Office 2013 is Office on Demand. Office on Demand basically would allow you to use any of the Office applications as and when you need to use them without the usual installation.

With Office on Demand, subscribers will be able to download full-featured temporary versions of the Office applications that will run on the local PC. All they have to do is pick a computer with an internet connection and log-on into their accounts on the Office 2013 website. After the work and use of the application is over, it will automatically “disappear”. Read more

Thursday, August 23, 2012

Don’t Trust SMS: iOS Flaw Allows Users To Fake The Sender Of Text Messages [Updates]

iPhone users, beware: a recently discovered flaw in iOS makes it possible for anyone to fake the number you’re receiving an SMS message from. This means that an SMS message might seem to come from a trusted source like your friends, family, or even your bank, when in fact it is coming from some unknown source.

The flaw, discovered by pod2g, is said to have been around since the first iteration of iOS on iPhone, and is also present in the latest version of iOS 6, Beta 4. While the problem actually lies with SMS protocols in general, the iPhone’s interface makes it harder to ensure who the SMS is really coming from, and makes it easier to fake the reply-to number. So when you hit reply, you might actually be replying to a different person than the one you think. Read more

Keep Your Credit Cards Safe From Skimmers | PCWorld

You're in a restaurant, enjoying a deep conversation. Peripherally, you see the waiter take your credit card and return a few minutes with a slip for you to sign. You think nothing of it until a few hours later when you receive a call from your bank: Someone is racking up serious debt on your credit card, mostly for electronics purchases. Is it you?

Skimming, a form of high-tech financial fraud, is on the rise worldwide. It relies on sophisticated data-reading electronics to copy the magnetic stripe information from your credit card or debit card. It can capture both your credit card number and your PIN. And it's happening not just at restaurants but at neighborhood gas pumps and ATM machines. Read more

Technology's Dark Side: Devious Devices Designed to Harm You | PCWorld

We're accustomed to the idea of hackers' trying to crack our computers, but today our TVs, cars, phones, and appliances are becoming increasingly vulnerable as we use technologies such as Wi-Fi, Bluetooth, RFID, cellular, and GPS to connect them.

Though increased connectedness has been a boon to convenience and communication, a sinister flipside has emerged: more and more real-world objects are hackable, some with potentially frightening real-world consequences.

Hackers can unlock your car and even start the engine. They can steal your credit card just by walking past you—without touching your wallet. They can hijack a lifesaving insulin pump and turn it against the user. Here's a roundup of some of the technology that bad guys can use to hack you and everything around you. Read more

Monday, August 20, 2012

New MPEG Standard Format Will Halve Video File Sizes And Maintain Quality [Updates]

A new draft standard for video has been agreed upon by delegates of the Moving Picture Experts Group (MPEG) which will revolutionise video for the digital streaming age, since the new standard will halve the size of video files while maintaining the quality. The new standard was decided in order to make bandwidth and download requirements for digital video streaming more manageable.

The old standard for compressed high-definition video, H264, is technically called MPEG-4 Part 10. This will eventually be replaced by the new High Efficiency Video Coding H.265, otherwise known as MPEG-H Part 2. Read more

How to Analyze Data Using Excel PivotTables | PCWorld Business Center

When you compile data in a list, you often need to answer questions such as "How much revenue did the West Coast office generate last month?" or "What was the average number of customers served at each office in each quarter last year?"

Excel's PivotTables (Microsoft runs the words together, although you’ll find pivot tables in other spreadsheet programs) can provide those types of answers.

Do you want to group data by category? Use a PivotTable. Interested in comparing results by person, by quarter, or by category? Use a PivotTable. Need to answer questions that start with "How many?" or "How much?" PivotTables can do that, too. Read more

Saturday, August 18, 2012

What You Need To Know Before Buying A Tablet

Tablets are starting to mature. Android’s new 4.1 release includes tweaks that dramatically improve the user experience. Apple’s iPad is now on its third iteration and continues to dominate the market. And Microsoft is about to enter the scene with Windows 8 RT, which is likely to inspire a range of new options.

If you’re thinking of buying a tablet you are not alone. The market has been growing and looks set for further expansion. But which one do you pick, and why? Read more

These Guys Didn’t Back Up Their Files, Now Look What Happened

These Guys Didn’t Back Up Their Files, Now Look What Happened