authentication
Safeguarding data in the healthcare industry
Concurrent logins, manual logoffs, password sharing and the lack of unique logins are putting patient records at risk, new research from IS Decisions has revealed. Despite …
New Toshiba CMOS image sensor improves recognition and authentication
In recent years, mobile devices have adopted user authentication systems to protect access and information security. Password entry remains the most common, but finger print …
Attackers take over org’s OWA server, harvest domain credentials with malicious DLL
Researchers from cyber attack detection and response outfit Cybereason have discovered a novel APT technique that was used by attackers to gain persistence in an (unnamed) …
Free WordPress plugin for a password-free login
Nearly 25 percent of the Internet runs on WordPress, and now these sites can be more secure thanks to a free WordPress plugin available from LaunchKey.The plugin enables …
Android 5 bug allows attackers to easily unlock password-protected devices
If you own a mobile device running any Android 5 version but the very last (v5.1.1) and you use a password to lock your device, you will want to update your OS or switch to a …
Encryption: Whose keys are they, anyway?
Over the past year, encryption has been showing up in a number of unlikely places. It started when Google executive chairman Eric Schmidt proclaimed that encrypting everything …
New Android malware could inflict $250,000 of losses
Bitdefender has uncovered CAPTCHA-bypassing Android malware, purposefully left in Google Play apps by unscrupulous developers, with the aim of subscribing thousands of users …
Protect against privileged credential attacks with zero trust
Enterprise networks – and the attacks against them – have evolved. No longer static, they are dynamic entities. And yet, IT organizations continue to use traditional security …
Unsurprisingly, most would support eliminating passwords
Password-based authentication is no longer capable of meeting the demands of modern information security, according to LaunchKey. An overwhelming 84% of respondents would …
Average financial services company uses 1,004 cloud applications
Skyhigh Networks analyzed cloud adoption in the financial services industry.The average financial services company uses 1,004 cloud services, which comes as a surprise to many …
Sound-Proof: Two-factor authentication without user interaction
Reaping all the benefits of two-factor authentication without suffering the inconvenience that is usually attached to the option is something that many users dream about …
Privileged accounts are still easy to compromise
A Thycotic survey of 201 Black Hat USA 2015 attendees found that a majority (75%) have not seen a fundamental change in the level of difficulty in compromising privileged …
Featured news
Sponsored
Don't miss
- How open-source MDM solutions simplify cross-platform device management
- Google on scaling differential privacy across nearly three billion devices
- Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups
- North Korean hackers pave the way for Play ransomware
- IoT needs more respect for its consumers, creations, and itself