authentication
Stealing login credentials from locked computers in 30 seconds or less
Security researcher Rob Fuller has demonstrated a simple way for stealing login credentials from locked computers running Windows and Mac OS X. For the attack to work, …
Iovation acquires LaunchKey, shows the future of authentication
Iovation, a provider of device-based solutions for authentication and fraud prevention, announced the acquisition of multifactor authentication company LaunchKey. The move …
Can biometrics and the FIDO Alliance save us from password overload?
All the available evidence indicates our password-based security system is broken. The human brain can only remember so much and its memory capacity is being pushed to the …
How much of a risk is BYOD to network security?
We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system …
Passwords, biometrics and multi-factor verification: What businesses need to know
Verifying identity is a double headache for small businesses. On the one hand, there’s the question of identity verification within your organization. You need to be sure only …
UK banks ramp up account security with voice recognition tech
British banking and financial services multinational Barclays has announced that it is introducing voice recognition technology for all personal banking customers, so that …
Review: True Key for iOS
I’ve been using 1Password for years – both their desktop and mobile products. Altough it works fine, I was curious to see what are the alternatives I can use on my …
Top 10 strategic technologies for government in 2016
After nearly a decade of “doing more with less,” government CIOs remain under pressure to further optimize IT and business costs while leading digital innovation …
Google’s new authentication option: a tap on the screen
Google knowns that usability is a pre-requisite for security, so they’ve come up (yet again) with a new option within the 2-step verification feature for Google …
Behavior is the new authentication: A look into the future
In the next few years organizations will face extreme IT security challenges. Hackers are targeting humans instead of machines. All the most costly cyber attacks (APTs, …
Milagro: A distributed cryptosystem for the cloud
A new open source project within the Apache Incubator aims to create an alternative to outdated and problematic monolithic trust hierarchies such as commercial certificate …
Do users’ perceptions of password security match reality?
Think your password is secure? You may need to think again. People’s perceptions of password strength may not always match reality, according to a recent study by CyLab, …