A terrific article on Internet security

2ba7b-computer__sadHow Apple and Amazon Security Flaws Led to My Epic Hacking

And as a result of reading this, I have:

  • backed up my images and key files
  • set gmail to use my mobile number as a second-level security check.

Have your say! (No need for any ID!)