New CADs shows iPhone 15 Pro camera bump isn’t as big as feared

0
[ad_1]

Today, 9to5Mac published CAD files for the iPhone 15, which shows us more of what the phone will look like. Complete with the new Action Button and the camera bump. According to the publication, these CADs come from an “extremely reputable source”, so these are likely very accurate. And at this point, the design changes are likely final.

Let’s talk about that Action Button. Many rumors have pointed to the iPhone 15 ditching the Mute Switch for an Action Button, similar to what the Apple Watch Ultra has. And we can see that here in these CAD files. It’s a bit smaller than the volume buttons, which sit below it, and it’ll only be available on the Pro models. The iPhone 15 and iPhone 15 Plus will stick with the mute switch.

iphone 15 cads 9to5mac 3

So the skinny of it here is that if you want to keep the mute switch, don’t get a “Pro” iPhone this year. But this could be the final year for the Mute Switch.

The camera bump isn’t as big as once rumored

On earlier rumors and leaks that we had seen, the camera bump on the iPhone 15 Pro and Pro Max were slated to be ginormous. Even compared to the iPhone 14 Pro’s camera bump. Luckily, that doesn’t appear to be the case here.

Don’t get things mixed up, the camera bump is still fairly large and getting larger this year. But it’s not as large as once thought.

With this bigger camera bump, it lends credence to the rumors that the iPhone 15 Pro Max would be getting a periscope zoom lens this year. That’s a larger lens, even if it is folded like it is on most other phones.

So there you have it, the first CADs for the iPhone 15 series this year. We’re likely just getting started with iPhone 15 leaks. Since the announcement is still well over four months away, it’s going to be a pretty busy summer here.


[ad_2]
Source link

Twitter rolls out a promised badge-like element and it’s the type you don’t want to have

0
[ad_1]

Hey, it’s been about 5 minutes, so that means it’s yet another time to talk about Twitter! Love it or hate it: most of us use it and have it installed on some of the best phones out there. As such, it’s probably good to be up-to-date with the happenings on the platform.

You are likely well aware that Musk took over Twitter and since then, many things have changed. Few were praised, some didn’t actually work as expected and others happened sort of in secret. Like, for example, the update to Twitter’s code of conduct.

TL;DR

Users who overstep the line will be punished by taking away their Tweets visibility. And that only makes sense, as the new guidelines aim to reduce misinformation, hate speech and other nasty verbal internet stuff. And now we can finally see it in action with the latest Twitter labels!



This was announced a while back on Twitter’s very own blog, but it took awhile before these labels actually started appearing on user profiles. Overall, there are three types of labels that you may encounter:
  • An exclusive one, which you get to see if you are the bad guy
  • One meant for the viewer
  • Another meant for the viewer, that has the option to display the contents of the Tweet, but after a warning

That last one is kind of reminiscent of what Instagram is doing, when it detects that a post may be too graphic or violent. Still though, unlike Instagram, some tweets will be outright made unavailable. Said posts will also be incapable of being:
  • Retweeted
  • Responded to
  • Saved
  • Having ads around them

(Did you hear that collective sigh of relief from advertisers?)

Beyond that, this update only makes sense, as the ultimate aim here is to reduce negativity on the platform. And, of course, this doesn’t in any way replace the outright removal of content or the good ol’ banhammer from the game. 

Naturally, the users who don’t agree with the platform’s decision will always be capable of making an appeal. However, as is typical with rules on social media, the platform reserves its right to a final judgement call. 

But there is an extra little bit of spice here: What happens with users who have the Blue Checkmark — the paid one — that get labels? No specific info as of now, but we’ll make sure to keep you posted, as it certainly sounds like an interesting situation to not  be in. 


[ad_2]
Source link

Cisco Launches Advanced Threat Detection XDR Platform

0
[ad_1]

In the recent hybrid, multi-vendor, multi-threat world, Cisco Extended Detection and Response (XDR) streamlines security operations with unrivaled visibility across the network and endpoint.

To accomplish its goal of the Cisco Security Cloud, a unified, AI-driven, cross-domain security platform, Cisco recently presented the most recent development.

Organizations should defend the integrity of their whole IT environment with the aid of Cisco’s new XDR solution and the introduction of sophisticated Duo MFA features.

The capabilities of the Cisco XDR Platform

Cisco’s XDR strategy combines its broad experience and endpoint visibility into a single, fully functional, risk-based solution. Also, Cisco XDR is currently in beta and will be generally available in July 2023.

“Cisco XDR prioritizes and remediates security incidents more efficiently using evidence-backed automation,” Cisco reports.

“The threat landscape is complex and evolving. Detection without response is insufficient, while response without detection is impossible. With Cisco XDR, security operations teams can respond and remediate threats before they have a chance to cause significant damage,” said Jeetu Patel, Executive Vice President and General Manager of Security and Collaboration at Cisco.

Cisco XDR concentrates on telemetry-centric data and produces results in minutes, whereas standard Security Information and Event Management (SIEM) technology manages log-centric data and measures outcomes in days.

It natively analyzes and combines the six telemetry sources—endpoint, network, firewall, email, identity, and DNS—that Security Operations Center (SOC) operators claim is essential for an XDR solution.

Cisco XDR uses information from 200 million endpoints with Cisco Secure Client, formerly AnyConnect, to give process-level visibility of the point at which the endpoint and the network meeting.

“The true measure of XDR is its ability to deliver actual security outcomes, real and measurable benefit to organizations — early detection, impact prioritization, and effective and efficient response,” said Frank Dickson, Group Vice President, Security & Trust, IDC.

Cisco XDR connects with prominent third-party vendors to share telemetry, promote interoperability, and deliver consistent outcomes independent of vendor or technology.

Out-of-the-box Integrations:

Endpoint Detection and Response (EDR): CrowdStrike Falcon Insight XDR, Cybereason Endpoint Detection and Response, Microsoft Defender for Endpoint, Palo Alto Networks Cortex XDR, SentinelOne Singularity, and Trend Vision One

Email Threat Defense: Microsoft Defender for Office, Proofpoint Email Protection

Next-Generation Firewall (NGFW): Check Point Quantum, Palo Alto Networks Next-Generation Firewall

Network Detection and Response (NDR): Darktrace DETECT™ and Darktrace RESPOND™, ExtraHop Reveal(x)

Security Information and Event Management (SIEM): Microsoft Sentinel

Cisco is rethinking what is required for access management as attackers increasingly target weaknesses in weaker multi-factor authentication (MFA) implementations.

Every company’s access control strategy must include three critical components: enforcing strong authentication, verifying devices, and limiting the number of passwords in use.

“To protect against multi-factor authentication (MFA) attacks, Cisco is now offering advanced features in all editions of Duo, the most secure, cost-effective, and user-friendly access management solution on the market.” Cisco.

Building Your Malware Defense Strategy – Download Free E-Book


[ad_2]
Source link

WhatsApp finally gets multi-phone support

0
[ad_1]

WhatsApp has finally received multi-phone support. This has been announced by Mark Zuckerberg himself. WhatsApp, as many of you know, is a Facebook company, so… there you have it.

WhatsApp gets multi-phone support, you can link up to 4 phones now

You can now use the same WhatsApp account from more than one phone, up to four, actually. Needless to say, this is a huge improvement compared to how things stood thus far. You were able to use the same account from multiple devices, but not multiple phones.

For example, thanks to the company’s multi-device feature, you were able to use it from your phone, tablet, and computer. If you use two phones, however, you were out of luck. That’s no longer the case, though.

The feature will be rolled out to everyone over the coming weeks

WhatsApp did say that this feature will be rolling out to all WhatsApp users over the coming weeks. So, just because it was announced, doesn’t mean you’ll be able to use it straight away. Some of you may have to wait a bit.

This is a crucial feature for some people, myself included. I constantly use more than one phone due to the nature of my work, and having such a feature is of utmost importance. This is actually one of the reasons why I was avoiding WhatsApp up until now.

You can link additional phones the same way you’d link your PC or tablet. Also, each device you link, connects to WhatsApp independently. That means that your personal messages, media, and calls are end-to-end encrypted. If your primary device ends up being inactive for a long time, though, WhatsApp will log you out from linked devices.

The company is also rolling out a new way to link devices

In addition to this, the company is also rolling out a new way to link devices using a one-time code. WhatsApp said: “You can now get a one-time-use code by entering your mobile number on WhatsApp Web, which you can use to link devices instead of scanning the QR code on your mobile phone. We’ll make this feature available for more linked devices in the future”.


[ad_2]
Source link

What is a virtual board room and what are its benefits?

0
[ad_1]

Modern businesses have long felt the impact of the virtual boardroom on the company as a whole. If you still think that this technology is used exclusively for conducting various kinds of video conferences, you are mistaken. At this point, it is an exceptional technology that can optimize entire business processes. At this point, we will look at some features of this software so that you can rationally choose it as the main one for your company. We’ll show some of the advantages that you need to consider when selecting this technology. We’ll look at what it is in general and give a precise definition that will help you further in your choice.

A board portal, what does it mean exactly?

The board meeting portal software is a versatile tool for modern businesses that can significantly enhance meetings and overall performance. It features built-in in-house conferencing or integrates with popular platforms such as Google or Microsoft servers. While video conferencing is a key feature, the software’s real value lies in its enhanced security and secure storage for meeting documents. It also offers various tools to facilitate decision-making for administrative or senior staff. Discover the many functions and tools of this software in the following discussion. Essentially, the boardroom portal is designed to automate and provide a paperless solution for businesses, which can alleviate overworked workflows and exhausted employees.

Streamlining Business Processes: Essential Features of Board Portal

Boardroom portals offer a plethora of innovative features that can revolutionize the way your company operates. Automation is at the core of this software, which can bring a level of efficiency that traditional methods simply cannot match. By using cloud computing on third-party servers with military-grade encryption and physical security measures, a board portal provides an unparalleled level of protection for your data.

  • Say goodbye to paperwork, thanks to secure cloud storage. With all your documents stored digitally, you no longer need to worry about buying paper and ink. Plus, in case of a natural disaster, your documents will be safe and secure. Accessing your files is easy—simply log in to your account via an app or web browser, and use eSignature to sign any necessary documents.
  • A unique video conferencing tool with an abundance of features that cannot be found elsewhere. As we have mentioned earlier, a virtual board software is a distinctive creation that exclusively focuses on executing intricate business processes and is equipped with a plethora of interesting functionalities to support those processes. In case you have any unresolved issues or your strategy is incomplete, these tools can provide valuable assistance during discussions, as none of the negotiation participants will be distracted or delay the conference in any way.
  • All interactions through boardroom portals are equipped with a fundamental level of security that extends to both online board meeting and data logging. This includes secure storage for recordings that only authorized personnel can access and personal accounts that are protected from potential intruders. To ensure maximum security, additional layers of protection such as isolation from the general internet and two-factor authentication are also implemented.

These are the core features that you will find in all software examples, and it’s crucial to keep that in mind.

The Promising Future of Board Portal Technology

According to independent researchers, the board management software has a bright future and is among the most promising corporate tools for business growth and optimization of resources. It can help you achieve a lot in terms of business development and automation.

  • The board portal can help you streamline your document management, potentially saving you time. Dealing with documents can be a time-consuming task, but the board portal aims to mitigate this. Its comprehensive set of tools simplifies document management and improves existing documents through smart indexing and file organization, among other features.
  • Keeping track of all meetings is crucial for ensuring effective communication and decision-making within a paperless meeting solution company. With a board portal, you can rest assured that every meeting is documented and monitored closely. This will help you avoid missing any key moments and reduce the number of unproductive meetings. Plus, you can access and review any meeting at any time.
  • Incorporating modern advancements, board portals utilize technologies like artificial intelligence and the Internet of Things. Artificial intelligence optimizes file organization and monitors meeting activity, while the Internet of Things connects various devices on a local Wi-Fi network to track user and employee performance. From webcams to coffee machines, all devices are part of a single system.

Board portal software is a great asset that helps you effectively conduct meetings and manage employee activities, making it an important resource for businesses that want to stay relevant in today’s marketplace.


[ad_2]
Source link

Lockbit Ransomware Aims To Target macOS Systems

0
[ad_1]

After wreaking havoc with Windows and Linux systems, the LockBit ransomware gang now intends to target macOS devices. However, researchers believe the malware may not be as successful on Mac due to Mac’s innate security.

LockBit Ransomware To Target macOS Systems

In a recent tweet, the MalwareHunterTeam disclosed encountering a new LockBit ransomware variant. Identified as “locker_Apple_M1_64” by the researchers, the new malware seems the first such attempt to target Mac specifically.

LockBit is a potent ransomware available as RaaS, initially targeting Windows, and later, Linux systems. During the past years, LockBit has executed numerous terrifying cyberattacks aimed at big services, like UK’s suburban train systems, the Swiss helicopter maker firm, and more. It then gradually improvised as LockBit 2.0, conducting even more severe attacks such as the Italian energy firm.

Later on, another ransomware variant, LockBit 3.0, also surfaced online, exhibiting more malicious capabilities. And the threat actors appeared more motivated to improve the malware as they announced a bug bounty program.

And now, it seems perfectly timed for the threat actors to take the lead in the RaaS world by announcing a dedicated Apple ransomware.

Following MalwareHnterTeam’s disclosure, vxunderground also confirmed having the malware samples.

While the ransomware initially escaped the radar of almost antivirus solutions, following this disclosure, VirusTotal now shows that many robust services have started flagging the malware samples.

Can LockBit Really Harm Macs?

Though LockBit successfully stirred up the cybersecurity realm by confirming its initiatives for targeting macOS. But can it hurt Mac devices as severely as Windows and Linux?

The researcher Patrick Wardle believes otherwise. As elaborated in his blog post, although the malware can reach Apple Macs, but it cannot successfully infect them – at least, for now. That’s because of macOS’s inherent security design that most malware find difficult to bypass.

In the case of the LockBit “locker_Apple_M1_64” variant, its first weakness lies in code signing. Wardle highlighted that the malware is signed as “ad-hoc,” and macOS doesn’t allow running such apps on the systems.

Besides, the researcher also deeply analyzed the malware and found nothing specific in it which could enable the ransomware to run on Macs. So, at present, this variant looks like nothing serious for Mac users.

Specifically, Apple has implemented SIP (and now read-only system volumes) to protect OS-level files. This means even if ransomware finds its way onto a macOS system it won’t (easily) be able to mess with core OS files. Apple has also added (TCC) protections to user files founds in (now) protected directories such as ~/Desktop, ~/Documents, etc. etc. This means, that without an exploit or explicit user-approval users files will remain protected.

Nonetheless, it doesn’t mean that Apple devices will remain immune to ransomware for eternity. Also, there have been several instances where Mac devices endured malware attacks. Wardle also pointed out that such a step from a large ransomware group shouldn’t appear trivial to the security community.

Therefore, it remains crucial for Apple, security professionals, and users to remain vigilant about protecting their Macs from such threats.


[ad_2]
Source link

Remembering some of the worst Android phones of all time

0
[ad_1]

Even the staunchest android fan will admit that android devices haven’t always hit the mark. In fact, it’s no secret that we’ve been exposed to a number of stinkers over the years.

In previous times, manufacturers tried to impact the space with a variety of android phones that really didn’t deliver. We aren’t just talking about horrific Chinese knock-offs here either, instead devices by respected brands, such as Motorola and Samsung, that were flawed. Of course, this particular topic is ultimately subjective, but there is no doubt that the android category has been filled with shoddy devices over the years.

Thankfully, in the modern world, innovation has improved things. Now, in 2023, android users can capture high-quality images that outdo the digital cameras of old, people can explore gaming options like the buffalo game show, a type of live casino game that features a croupier as host and enables gamers to experience casino life in the palm of their hands, while Android phones can also help us find love with a few swipes or stream live sport, too. In order to get here, though, we’ve had to endure some seriously dodgy phones. Let’s look at some of the worst of them below.

The Motorola DROID Bionic bombed massively

If you’re an avid android user and know about the history of android phones, then you’ve probably stumbled across the Motorola DROID Bionic before. It’s fair to say that this particular device bombed spectacularly, too, with a delayed release being credited with two or three redesigns that didn’t tickle many people’s fancy. When the phone eventually did hit the shelves, it was riddled with bugs that made it feel like nothing short of a lazy release. The problems were extensive from the offset, but the phone was still being marketed to potential customers. In fairness, the device was eventually corrected in the following months, but what came before that put many consumers off. What a shambles.

The HTC EVO 3D provided a miserable experience

A device that created a lot of hype thanks to its “revolutionary” 3D camera that was apparently going to change the game, the HTC EVO 3D was a massive letdown. While the camera did deliver a solid photo-taking experience, it wasn’t anything like the manufacturers hyped it up to be. Throw in the phone’s shocking battery life and its rather poor design that chipped easily, and it’s fair to say that the HTC EVO 3D really didn’t live up to expectations.

Samsung Galaxy Note 7 caught fire for no apparent reason

Despite the Samsung Galaxy Note 7 offering a range of impressive features, such as its solid battery and its lovely curved display, the fact that users were sending back devices and avoiding serious accidents due to the phone catching on fire made it a nightmare. Exploding phones aren’t new, of course, but the fact that it happened with a highly anticipated device, and that it was recalled initially only to then start catching on fire again, will go down as one of Samsung’s worst moments ever.

You wouldn’t give the Kyocera Echo to your worst enemy

Kyocera Echo image 893483984
Source: https://twitter.com/x3isofficial

It’s probably no surprise that Kyocera failed to hit the right notes, given the brand’s horrific track record, but the Kyocera Echo was expected to buck the trend. Sadly, and somewhat predictably, it was an absolute disaster. Not only did the device resemble a brick, but the over-exaggerated bezel was a pain. Additionally, while the two 3.5-inch screens promised a lot and sounded intriguing initially, they resulted in a truly painful user experience that was nothing but a classic case of terrible engineering.


[ad_2]
Source link

The role of branding in digital marketing strategies

0
[ad_1]

In today’s digital world, branding has become a crucial aspect of marketing strategies. A brand is much more than just a logo or a name; it represents the identity and reputation of a company. Digital marketing has opened a whole new world of opportunities for businesses to establish their brand and connect with their target audience. The rise of digital marketing has made it easier for businesses to reach their target audience and establish a strong online presence.

However, with the growing competition, it has become challenging for companies to stand out and create a lasting impression on their customers. This is where branding comes into play. By developing a strong brand identity, companies can differentiate themselves from their competitors and create a loyal customer base. This article will explore the role of branding in digital marketing strategies and how it can help businesses stand out in a crowded market.

Understanding Branding in Digital Marketing

“Branding” is the process that provides a company with an exclusive identity. It includes everything from the logo, name, colors, tone of voice, and overall personality of the company. In digital marketing, branding goes beyond just creating a visual identity. It also involves creating a consistent experience for customers across all digital channels, including social media, websites, email marketing, and mobile apps.

By working with a reputable branding agency, businesses can create a unique brand identity that reflects their values and resonates with their customers. Whether it’s developing a new logo or creating a consistent brand voice across all digital channels, branding services in Los Angeles can help businesses differentiate themselves from their competitors and establish a strong online presence.

Importance of Branding in Digital Marketing

Branding is crucial for businesses that want to establish a strong online presence and connect with their target audience. Here are some of the key benefits of branding in digital marketing:

  • Differentiation: A strong brand identity helps businesses stand out from their competitors and create a unique image in the minds of their customers.
  • Recognition: Consistent branding across all digital channels can help businesses build brand recognition and increase their visibility.
  • Trust and Loyalty: A well-established brand creates a sense of trust and loyalty among customers, making them more likely to make repeat purchases.
  • Increased Engagement: A strong brand identity can lead to increased engagement on social media, email marketing, and other digital channels.

Building a Strong Brand Identity

Building a strong brand identity requires a strategic approach. Here are some of the key steps to creating a strong brand identity:

Defining Your Brand

Establishing what your brand stands for is the first step in creating a strong brand identity. Identifying your mission, values, and distinctive selling points is a part of this. By understanding what sets your brand apart, you can create a message that resonates with your target audience.

Creating a Brand Voice

The tone and personality of your brand are reflected in its brand voice. It should be consistent across all digital channels and reflect the values of your brand. Your brand voice should be tailored to your target audience and help you connect with them on a deeper level.

Consistency in Branding

Consistency is key when it comes to branding. Your brand identity should be consistent across all digital channels, including your website, social media profiles, email marketing, and mobile apps. This creates a cohesive brand experience for your customers and helps build brand recognition.

Incorporating Your Brand in All Marketing Channels

Incorporating your brand identity into all marketing channels is crucial for establishing a strong online presence. This includes creating visually appealing graphics and messaging that align with your brand voice. By creating a consistent brand experience across all channels, you can establish trust and recognition among your target audience.

The Connection Between Branding and SEO

Branding and SEO are interconnected in digital marketing. A strong brand identity can have a positive impact on your search engine rankings. By establishing a recognizable brand, you can increase your brand mentions and backlinks, which are important factors for SEO.

Additionally, having a consistent brand identity across all digital channels can help search engines identify your brand and improve your visibility in search results.

Measuring the Success of Your Branding Efforts

Measuring the success of your branding efforts is essential for optimizing your digital marketing strategy. Here are the two most important metrics you should monitor:

Tracking Brand Awareness

Tracking brand awareness involves monitoring brand mentions and social media engagement. By tracking your brand mentions, you can identify areas where you need to improve your brand messaging and increase your visibility.

Analyzing Brand Engagement

Analyzing brand engagement involves monitoring your website traffic, email open rates, and social media engagement. By tracking these metrics, you can identify which digital channels are driving the most engagement and adjust your strategy accordingly.

Common Branding Mistakes to Avoid

Avoiding common branding mistakes is crucial for establishing a strong brand identity. Here are some typical branding missteps that you should stay away from:

Inconsistent Branding

Inconsistent branding can confuse your target audience and undermine your brand identity. To avoid this, make sure that your brand messaging and visuals are consistent across all digital channels.

Not Understanding Your Target Audience

Not understanding your target audience can lead to ineffective branding efforts. To create a strong brand identity, you need to understand the needs and preferences of your target audience.

Ignoring Brand Reputation

Ignoring your brand’s reputation can negatively affect your digital marketing strategy. Make sure that you monitor your online reputation and address any negative feedback or reviews.

Conclusion

In conclusion, branding is a crucial aspect of digital marketing strategies. By creating a strong brand identity, businesses can differentiate themselves from their competitors and establish trust and loyalty among their customers. Building a strong brand identity requires a strategic approach, including defining your brand, creating a consistent brand voice, and incorporating your brand identity into all digital channels. Measuring the success of your branding efforts is also essential for optimizing your digital marketing strategy.


[ad_2]
Source link

Your Chrome tabs and bookmarks could soon be found using the Pixel launcher search bar

0
[ad_1]
A Chrome feature flag called “Integrate with Android App Search” was spotted by LanceAdams on Telegram (via mobile tech journalist Mishaal Rahman, AndroidPolice) indicating that Chrome tabs and bookmarks could be found and opened by using the search bar on the Pixel Launcher.  A previous version of the flag made it clear what it will do: “Donate the tabs and bookmarks to Android App Search.” A feature flag, found on developer options, allows you to enable or disable a new feature without having to install an update.
While this feature should debut on Pixel models, it could end up on other Android handsets outside of the Pixel series. Last year it appeared that Google was going to allow the Pixel Launcher search bar to search from inside additional apps while it would also appear on third-party launchers. So far, though, we haven’t seen this come to light. With the discovery of the “Integrate with Android App Search” flag, it’s possible that we could soon see the Pixel Launcher search bar appear on third-party launchers and grab info from inside more apps.

 

If you don’t own a Pixel but have a thing for the Pixel Launcher’s search bar, a third-party app called the Pixel Search app is available from the Play Store. The app is free and the developer behind it, Rushikesh Kamewar, has 15 apps already available in the Google Play Store. The only thing the app can’t do that the real Pixel Launcher search bar can is search for is system settings although Kamewar says that such a feature will eventually be added to the app.

Being able to search for your Chrome apps from the Pixel Launcher search bar will allow users to return to their Chrome browsing session without having to reopen the app. It also will allow users to reduce the number of Chrome tabs they have open, and make it easier to find Chrome bookmarks.


[ad_2]
Source link

Google Authenticator Major Update Brings Cloud Backup Feature

0
[ad_1]
Google Authenticator

Google Authenticator was launched in 2010, which provides additional security for various applications by providing authentication codes for every sign-in.

This prevents attackers from account takeover on any application linked with Google Authenticator.

Google has launched various authentication mechanisms like Google Password Manager, Sign in with Google, Google Authenticator, One-tap sign-in to Google account, etc.

Google Authenticator

Google has also been working on simplifying the process of secure sign-in.

Though Google Authenticator can provide better protection and advantage to security, it still has a great drawback.

If a user loses the device in which this Google authenticator is installed, they face an account lockout as they cannot log in without the authentication codes.

However, Google has now released a new feature in Google authenticator that will help overcome the problem of devices lost/stolen.

This new update on Google authenticator has the option to backup codes to users’ Google accounts as a safety mechanism. This update is now available for both Android and iOS platforms.

With this update we’re rolling out a solution to this problem, making one-time codes more durable by storing them safely in users’ Google Account. This change means users are better protected from the lockout and that services can rely on users retaining access, increasing both convenience and security.” reads the post from Google.

Google also stated they have been working on a “passwordless future.” Google has partnered with the FIDO alliance for a convenient and secure authentication offering like “passkeys.”

Users must update their Google authenticator application on their devices to use this feature.

Building Your Malware Defense Strategy – Download Free E-Book


[ad_2]
Source link