Please turn on your JavaScript for this page to function normally.
fire
Google’s poor design decision undermines 2FA protection

A design decision by Google can be exploited by attackers to gain control of both devices needed to access users’ accounts protected via SMS-based 2-factor …

Bug
Microsoft plugs online services account hijacking vulnerability

London-based security researcher and bug hunter Jack Whitton has discovered a serious cross-site request forgery flaw affecting Microsoft’s authentication system for …

Gmail
New alerts for Gmail users targeted by state-sponsored attackers

Since 2012, Google has been warning Gmail users when they have been targeted by state-sponsored attackers, but now the alert will be even more visible (and therefore less …

password
Banks failing with password management, but why?

A recent study shows some terrifying results: banks in the U.S. often have less secure password policies in place than do social media websites. Specifically, the study found …

Amazon
Amazon selfie password: Is this the future?

Amazon’s “Selfie Authentication” allows the site’s customers to user facial recognition to authenticate themselves to the website in order to make a purchase. While not …

authentication
Customer Authentication: Multi-factor security from iovation

With most transactions now happening online, providing customers with a frictionless online experience that’s also highly secure is critical for today’s businesses. Still, …

Google Hands
Google Hands Free entering the mobile payments game

Google has announced that it is testing its new payment app, Hands Free, which (as the name suggests) allows users to make payments without the need to use their hands, mobile …

keyboard
Why outsource risk management to people who don’t care?

The 2015 Cost of Cyber Crime Study by the Ponemon Institute reported that 50% of companies have implemented some sort of access governance technology. It fell 4th on the list …

ear
Biometric tech uses sound to distinguish ear cavity shape

NEC is developing a new biometric personal identification technology that uses the resonation of sound determined by the shape of human ear cavities to distinguish …

mobile fingerprint hack
Hack a mobile phone’s fingerprint sensor in 15 minutes

Two researchers from Michigan State University’s biometrics group have devised a method for hacking mobile phone’s fingerprint authentication by using just a color …

digital identity graph
Digital Identity Graph helps detect fraud, cyberattacks

ThreatMetrix announced at RSA Conference the newest innovation in the fight against global cybercrime – the Digital Identity Graph, a framework for anonymized global digital …

users
Only one in five orgs set up to securely manage user identities

As organizations seek to capitalize on digital opportunities through rapidly developing and hosting new services online, they frequently under-invest in adequate cybersecurity …

Don't miss

Cybersecurity news