authentication
Operation Emmental exploits holes in banking security
Trend Micro researchers have discovered and analyzed a clever attack aimed at customers of Austrian, Swiss, Swedish, and Japanese banks. They dubbed it Emmental, after the …
Interest for SSL and PKI on the rise
The surge in the number of data breaches and recent security bugs such as Heartbleed has generated strong interest in digital certificates and technologies, including SSL and …
Selectively re-using bad passwords is not a bad idea, researchers say
For all the repeated advice to use different, complex password for each online account, users are still opting for easy-to-guess, short ones and use them repeatedly across …
Critical vulnerabilities in web-based password managers found
A group of researchers from University of California, Berkeley, have analyzed five popular web-based password managers and have discovered – and then responsibly …
Google catches India with fake certificates
As the world becomes more dependent, and some might say blindly so, on digital certificates it’s only natural that attackers will seek to circumvent this trust. Whether …
Why IAM will be worth over $10 billion by 2018
Enterprises are increasing their investment in Identity and Access Management (IAM) solutions. According to research firm MarketsandMarkets, the IAM Market is expected to grow …
The building blocks of a successful authentication infrastructure
In this interview, Josh Alexander, CEO of Toopher, discusses how an increasingly mobile workforce shapes the way an organization deals with authentication issues, provides …
PayPal 2FA flow partially mitigated, accounts are safe
In the wake of the revelation of a flaw that allows attackers to bypass PayPal’s two-factor authentication feature, the e-payment giant has made it temporarily …
Authentication innovation, identity and credential management
In this interview, Richard Parris, CEO of Intercede, talks about how the digital world has shaped our identity, the main catalyst behind authentication innovation as well as …
Advanced cyber attacks rely on privileged credential exploitation
While new and sophisticated malware variants were continually developed to exploit systems in 2013, criminals, hacktivists and advanced attacks continue to do the most damage …
How the cloud can be used and misused
Peter Jopling, CTO and Software Security Executive, IBM UK & Ireland, talks about threats to cloud infrastructure providers, the importance of real-time data analytics, …
Defeating UEFI’s SecureBoot
The Unified Extensible Firmware Interface (UEFI) is ment to replace the Basic Input/Output System (BIOS) firmware interface found on all IBM PC-compatible personal computers. …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities