Tag Archives: two

Setting Up Two-Step Verification and Trusted Devices

I vividly remember reading Mat Honan’s horror story in Wired magazine about being hacked and having his devices, some of which weren’t backed up, wiped out and his social media accounts taken over. I also haven’t forgotten that one of the players in that very complex chain of events that lead to the unraveling of his digital life was Apple They were hit with a social engineering attack that ended up being the last domino to fall, giving the hackers free reign over Mr Honan’s Apple devices, and in turn, all of his information. The fact that Amazon, Google and Apple were ALL involved in this hack in various ways was definitely eye-opening.

Continue reading

Share This: