Wired | Over the last several years, Yubico has become close to ubiquitous in the field of hardware authentication. Its YubiKey token can act as a second layer of security for your online accounts and can even let you skip out on using passwords altogether. The only problem? It’s been largely unusable on the iPhone. That’s going to change soon.
Ars Technica | "There's a new cellular network technology on the way. The 5G upgrade will require new modem technologies, lots of new chips to pack into devices, and the need for new and more plentiful cell towers. That all sounds like a lot of hard work, so wouldn't it be easier to just update everyone's 4G icon to '5G' and call it a day? Welcome to AT&T's 5G plan, where perception and marketing is all that matters. AT&T is just going to start calling 4G LTE '5G E,'" writes Ron Amadeo. "The company started rolling out a software update to several Android phones, and what was called '4G' yesterday is now called '5G' today."
BetterCloud Monitor | In the era of data breaches, what makes up a successful security program? BetterCloud’s Senior Security Architect Austin Whipple shares what success and failure look like in a security program. After reading this article, you’ll come away with a few ideas you can implement right away. Here’s what he’s seen work.
ZDNet | A new penetration testing tool published at the start of the year by a security researcher can automate phishing attacks with an ease never seen before and can even blow through login operations for accounts protected by two-factor authentication (2FA). Named Modlishka — the English pronunciation of the Polish word for mantis — this new tool was created by Polish researcher Piotr Duszyński. Modlishka is what IT professionals call a reverse proxy, but modified for handling traffic meant for login pages and phishing operations.
Computerworld | Want to sign into a computer from another desktop or a mobile device? Here's how to use Google's Remote Desktop to make the connection.
How-To Geek | Google Docs now lets you edit your sharing link to provide a PDF. Best of all, if you edit the original document, the PDF link automatically includes any changes you made. Here’s how it works.
CIO | Automation can reap efficiencies, reduce errors, and free up staff for higher-value tasks — especially when undertaken as part of a company-wide strategic effort. #4 on this list of things that IT should be automating? IT operations. (BetterCloud can help with this across SaaS apps.) Free registration required to read.
Motherboard | T-Mobile, Sprint, and AT&T are selling access to their customers’ location data, and that data is ending up in the hands of bounty hunters and others not authorized to possess it, letting them track most phones in the country.
SAASupdate
BetterCloud Monitor | You can now embed Google Drawings files saved in Drive into Google Docs, and you can also assign unique colors to chart elements in Google Sheets. Google is adding auto-provisioning support for two new apps: monday and Proxyclick.
Twitter   FaceBook   LinkedIn   Google+