Please turn on your JavaScript for this page to function normally.
The future of electronic payment: Smartphone authentication and facial recognition

Withdrawing cash from an ATMs by using a debit or credit card or paying with it at a point-of-sale may soon become a thing of the past, as several manufacturers have presented …

App turns a mobile device into a personal authenticator

Passwords are at the root of online security problems because when typed into browsers, sent over open networks and centrally stored, they are easily compromised leaving the …

New USB flash drives from SanDisk

SanDisk announced three USB flash drives, the SanDisk Ultra USB 3.0, Cruzer Orbit and Cruzer Force USB flash drives. All three drives are ideal for secure storage, allowing …

Audit privileged access to Microsoft Online Services

Xceedium announced Xsuite will include protection for Office 365, Exchange, Lync, and SharePoint. The additional protection for Microsoft online services complements …

“Pinterest Tool” scam aimed at stealing login credentials

Last week we warned about fake “Password changed” emails targeting users of the popular photo-sharing website, but there has been a general uptick in …

Two-factor authentication for websites

Incapsula announced Login Protect, which enables instant activation of two-factor authentication to websites and Web applications, without requiring any coding, application …

Most Internet users have fallen victim to malware

The current state of cyber-security has left US Internet users anxious about hacks and password theft. Despite constant victimization, the majority are not using two-factor …

Facebook squashes critical account hijacking bug

A U.K.-based security researcher has shared details of a recently patched Facebook vulnerability that he discovered and for which he received $20,000 via the the social …

Ping Identity updates cloud identity management platform

Ping Identity announced PingFederate 7, an upgrade to its identity bridge software and Cloud Identity Management Platform. The release delivers standards-based user …

The future of online authentication

Recently, Twitter has introduced 2-factor authentication – the latest in a long list of large-scale web services that have taken this step including Google, Microsoft …

What are users doing after log-in?

Businesses today use up to 50 on-premises applications and 25 cloud-based applications on average, so identity and access management (IAM) technologies to secure data and …

Fake Mt. Gox pages aim to infect Bitcoin users

Mt. Gox is the the largest Bitcoin exchange in the world, and as such it and its users are being repeatedly targeted by attackers. Some two months ago, it battled a massive …

Don't miss

Cybersecurity news