Monthly Archives: May 2013

Use 2-step verification

The moral of the following story is: use 2-step verification. If you need to log into you Gmail from a strange computer, make it call your cell phone and confirm it’s really you. It can do SMS or voice or you can carry a list of one-time-use verification codes. Oh, and use a special password on your key accounts.

Back in 2012 there was a terrible story in Wired about how a hacker broke into Mat Honan’s Gmail account and used that to gain access to all his other accounts. The goal of this hacking spree was to vandalize Mat’s twitter. However, to keep the game afoot as long as possible, they used his newly compromised online identity to get Apple to wipe Mat’s iPhone, iPad, and MacBook. Another great reason to own an apple product (remember: if you can’t open it, you don’t own it).

Too much of my life is wrapped up in my Google accounts to leave them at risk. How about you?

Cheers,

Peter

Advertisements