authentication
How to keep your contactless payments secure
Contactless transactions – ranging from access control and ticketing to financial payments – emerged almost two decades ago and, since then, have become widely …
Apple adds two-step verification for iCloud
Apple has announced that the two-step verification option for iCloud accounts now also extends to iCloud backups, preventing attackers who know the target’s password …
Massive Gmail credential leak is not result of a breach
By now, you might have heard that there has been a leak of a nearly 5 million username and password combinations associated with Google accounts. According to an RT report, …
Apple built multi-factor authenticated payment in the right order
As an American living in Europe I have been perplexed at multi-factor authentication for payments. The Americans (laggards in my opinion) have been using magnetic stripe cards …
Namecheap accounts brute-forced by CyberVor gang?
California-based domain registrar and web hosting firm Namecheap has been targeted by hackers, the company’s VP of hosting Matt Russell warned on Monday, and said that …
51% of consumers share passwords
Consumers are inadvertently leaving back doors open to attackers as they share log in details and sign up for automatic log on to mobile apps and services, according to new …
Successful strategies to avoid frequent password changes
1.2 billion passwords reportedly stolen by Russian hackers. Before that it was Heartbleed. After a widespread, nonspecific data breach, the conventional wisdom is that people …
Gemalto to acquire SafeNet
Gemalto has signed a definitive agreement to acquire 100% of the share capital of SafeNet, a worldwide leader in data protection and software monetization, from Vector Capital …
92% of brands fail email security test
The Online Trust Alliance (OTA), the non-profit with the mission to enhance online trust and empower users, announced the results of its 2014 Email Integrity Audit report, …
Teen researcher publishes PayPal 2FA bypass exploit
Joshua Rogers, a teenage whitehat based in Australia, has found an extremely simple way to bypass PayPal’s two-factor authentication feature. Rogers first discovered the …
Looking at insider threats from the outside
Cybersecurity is a never-ending battle requiring around-the-clock attention. From malware to DDoS to APT attacks, front-line IT security teams are being constantly bombarded. …
The value of Bring Your Own Identity
New research shows that both the lines of business and IT departments see value in Bring Your Own Identity (BYOID) initiatives, where social networking or digital IDs are used …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities