• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: phishing

Yubico Security Key
Featured Video Play Icon

Yubico Launches New Version Of Authenticator App

Security key company says the new version of its authentication app now works seamlessly across Windows, Mac, Linux, Android and iOS.

December 9, 2019 Zachary Comeau Leave a Comment

Authentication security key manufacturer Yubico has launched the latest version of its iOS mobile application which now extends support for near field communication to deliver tap-and-go flexibility and authentication over a Lighting connection. The company said the new app – v. 1.1 – now works with all major desktop and mobile platforms, including full support […]

Read More

Qualcomm Fingerprint Sensor

Qualcomm’s New Fingerprint Sensor Hailed as Secure

Qualcomm says its new 3D Sonic Max fingerprint sensor solves security issues with prior versions of the under-screen sensor.

December 4, 2019 Zachary Comeau Leave a Comment

With the rise of phishing attacks and sophisticated hacking activities, passwords are becoming less popular due to their security vulnerabilities. But the new Qualcomm Fingerprint Sensor may not be prone to as many vulns. Fingerprint scanning technology is now becoming more secure, as Qualcomm has upgraded its on-screen fingerprint reader to unlock a smartphone. The […]

Read More

Identity Management Techniques,

Tech Managers Need Identity Management Techniques (For Personal AND Business Data)

MSPs tell us how important it is to lock down your and your employees' personal info with identity management techniques in order to protect business data.

December 4, 2019 Adam Forziati Leave a Comment

We at TechDecisions have spoken with many MSPs recently, and as a result, we’re feeling a bit… paranoid. I’m personally about to download a password manager since that was identified as one of the most common identity management techniques MSPs advise their clients use. Now more than ever, I’m afraid any personal data compromised might have a […]

Read More

Managed Service Providers, MSPs, MSP horror stories

MSPs: Our Knights in Shining Armor

We asked managed service providers (MSPs) about their experiences helping customers navigate murky waters after they've been compromised.

December 3, 2019 Zachary Comeau Leave a Comment

Technology managers, IT professionals and managed service providers are often the unsung heroes of the office. They are the gatekeepers of your company’s secured networks and the knight in shining armor when that network is breached. As such, IT providers usually have some pretty good stories to tell about rescuing their clients from the dungeons of […]

Read More

cyber security checklist

The Cyber Security Checklist: Make Sure Employees Follow These 4 Cyber Security Best Practices

Show this cyber security checklist of best practices to your employees: it is the bare minimum of what they need to do to keep your company or org safe!

November 14, 2019 Susan Alexandra Leave a Comment

Cyber security is a major concern for all businesses and organizations. Despite having secured infrastructure, tools, and teams; companies and organizations can face a great loss with the small mistake of its employees. Employees are the working body of any organization and must be well aware of cyber security threats. Whether you are working in […]

Read More

Titan USB-C

Google Releases USB-C Security Key

Google's new USB-C Titan Security Key offers secure two-factor account authentication, is compatible with Android, Chrome OS, macOS and Windows devices.

October 28, 2019 Zachary Comeau Leave a Comment

Google has released an additional option for devices across several platforms that will help boost security and fight phishing attacks. The technology giant partnered with hardware authentication device manufacturer Yubico —it’s longtime partner — on the USB-C Titan Security Key., a new two-factor authentication tool. According to a Google blog post, the USB-C Titan Security […]

Read More

remote connectivity hacking

Tips for Avoiding Remote Connectivity Hacking

Remote connectivity hacking can be trickier to spot as scams are becoming more advanced. Here's how to address them at your organization.

October 3, 2019 Finn Faldi Leave a Comment

For the better part of the past decade, online tech support scams have been on the rise as hackers find new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true remote connectivity hacking scam today relies on sophisticated social engineering fueled with detailed information on the […]

Read More

Windows 10 Vulnerability

New Bedford Avoids Paying $5 Million in Ransomware Attack by Doing Something Unusual

New Bedford ransomware attack proves the decision of whether or not to pay the hackers doesn't always have to be a hard "no!"

September 19, 2019 Adam Forziati Leave a Comment

The city of New Bedford, Mass. — not too far away from us here at TechDecisions — recently avoided paying the $5.3 million hackers demanded of it after successfully launching a ransomware attack. The town’s response? Bargain-and-stall. And it worked. Not the usual method An NPR article reports that after IT personnel discovered the attack the day […]

Read More

eCommerce Fraud Prevention

Anti-Fraud Platform Releases Comic Book About eCommerce Fraud Prevention

Anti-fraud platform Covery has released a comic book about eCommerce fraud prevention surrounding a pretend company, "Zamazon."

September 13, 2019 Adam Forziati Leave a Comment

A new comic book all about eCommerce fraud prevention was commissioned and released by Covery. Covery is a global risk management platform helping online companies prevent fraud and mitigate risks. The company specializes in KYC automation, device fingerprinting, user events analysis, and user risk scoring that help to solve fraud typical in low- and high-risk […]

Read More

government cyberattacks Google Microsoft

Who Got Hacked This Week? August 12 Edition

What types of cyberattacks were carried out this week, August 12, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

August 12, 2019 Jonathan Blackwood Leave a Comment

What types of cyberattacks were carried out this week, August 12, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 28
  • Page 29
  • Page 30
  • Page 31
  • Page 32
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.