authentication
The future of electronic payment: Smartphone authentication and facial recognition
Withdrawing cash from an ATMs by using a debit or credit card or paying with it at a point-of-sale may soon become a thing of the past, as several manufacturers have presented …
App turns a mobile device into a personal authenticator
Passwords are at the root of online security problems because when typed into browsers, sent over open networks and centrally stored, they are easily compromised leaving the …
New USB flash drives from SanDisk
SanDisk announced three USB flash drives, the SanDisk Ultra USB 3.0, Cruzer Orbit and Cruzer Force USB flash drives. All three drives are ideal for secure storage, allowing …
Audit privileged access to Microsoft Online Services
Xceedium announced Xsuite will include protection for Office 365, Exchange, Lync, and SharePoint. The additional protection for Microsoft online services complements …
“Pinterest Tool” scam aimed at stealing login credentials
Last week we warned about fake “Password changed” emails targeting users of the popular photo-sharing website, but there has been a general uptick in …
Two-factor authentication for websites
Incapsula announced Login Protect, which enables instant activation of two-factor authentication to websites and Web applications, without requiring any coding, application …
Most Internet users have fallen victim to malware
The current state of cyber-security has left US Internet users anxious about hacks and password theft. Despite constant victimization, the majority are not using two-factor …
Facebook squashes critical account hijacking bug
A U.K.-based security researcher has shared details of a recently patched Facebook vulnerability that he discovered and for which he received $20,000 via the the social …
Ping Identity updates cloud identity management platform
Ping Identity announced PingFederate 7, an upgrade to its identity bridge software and Cloud Identity Management Platform. The release delivers standards-based user …
The future of online authentication
Recently, Twitter has introduced 2-factor authentication – the latest in a long list of large-scale web services that have taken this step including Google, Microsoft …
What are users doing after log-in?
Businesses today use up to 50 on-premises applications and 25 cloud-based applications on average, so identity and access management (IAM) technologies to secure data and …
Fake Mt. Gox pages aim to infect Bitcoin users
Mt. Gox is the the largest Bitcoin exchange in the world, and as such it and its users are being repeatedly targeted by attackers. Some two months ago, it battled a massive …
Featured news
Resources
Don't miss
- Banshee Stealer variant targets Russian-speaking macOS users
- Ivanti Connect Secure zero-day exploited since mid-December (CVE-2025-0282)
- GitLab CISO on proactive monitoring and metrics for DevSecOps success
- Sara: Open-source RouterOS security inspector
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd