Change your passwords at these sites in light of Heartbleed security hole

  • April 10, 2014

In case you hadn’t heard, a massive security flaw dubbed “Heartbleed” has affected around two thirds of web sites and was discovered by benevolent software developers on Tuesday. The net effect is that your passwords, and by association data, have been and are vulnerable. As more information is being gathered, we can help you figure out which accounts have been compromised.

Read more

We have not been affected by the Heartbleed vulnerability

  • April 9, 2014

In light of the news of widespread security vulnerabilities due to a poor implementation of HTTPS connections and SSL/TLS encryption, we want to ensure Getting Things Tech users that you are and have been safe browsing with us.

Read more

Most of web exposed after OpenSSL “Heartbleed” security hole is found

  • April 9, 2014

Just as we sang the praises of HTTPS connections for browsing security, our following article about the vulnerabilities of HTTPS and SSL/TLS appears more prudent. On Tuesday, a group developing security software noticed a tremendous hole in the implementation of much of the secure connections across the web.

Read more

Two-factor authentication is a simple way to secure online accounts

  • April 8, 2014

While we stress the importance of creating strong passwords with the use of third-party software, there is still another step you should be taking to add eons of security to your accounts at very little cost to convenience. That step is to add two-factor authentication where you can, which makes you prove that you are yourself in addition to entering the correct password.

Read more

The vulnerabilities of HTTPS and SSL/TLS

  • April 7, 2014

We have spent a lot of time championing HTTPS connections as one of the most basic browsing habits for good privacy protection. However, there is always a risk when talking up a security protocol: a false sense of security. With that in mind, let’s talk about the ways in which HTTPS and the SSL/TLS encryption process that makes it secure come up short.

Read more