authentication
Google 2-step login verification flaw allows account hijacking
Duo Security researchers have found an easy way to bypass Google’s two-step login verification by capturing a user’s application-specific password. “To make …
Enterprise account manager with double safekeeping feature
Double safekeeping, or the two-man rule, has long been an established control mechanism for ensuring high levels of security during critical operations because the process …
OAuth flaw allowed researcher full access to any Facebook account
A flaw in Facebook’s OAuth system that allows the communication between applications and users has enabled web application security specialist Nir Goldshlager to gain …
ESET releases two-factor authentication software solution
ESET announced the availability of ESET Secure Authentication, a two-factor authentication (2FA) software solution for SMBs that makes use of remote end-users’ mobile …
Google account hijacking dramatically reduced
Google employs many security measures to thwart would-be Google account hijackers, and not all are highly visible as the two-factor authentication option introduced in 2010 …
Security is top reason why IT adopts single sign-on
Security is the number one reason why IT professionals implement single sign-on (SSO) and identity and access management (IAM) technology, according to new research from …
Twitter entreats users to use better passwords
Twitter is urging users once again to improve their passwords – both on Twitter and on other online services. Apart from the usual advice on using longer, more complex, …
Duo Security launches secure mobile ID
Duo Security announced that the high level of security traditionally associated with hardware smart cards is now available on consumer mobile devices that use Duo’s …
Virtual appliance fuels Bring Your Own Identity
NetIQ announced SocialAccess, a virtual appliance that allows business and government entities to leverage social identity providers to share select identity information for …
FIDO Alliance designs open, non-proprietary authentication protocol framework
Internet companies, system integrators and security providers have formed the FIDO Alliance (Fast IDentity Online) to revolutionize online authentication with an industry …
New security startup tackles strong authentication
Nok Nok Labs launched today. Through its Unified Authentication Infrastructure, which leverages existing technologies such as fingerprint sensors or webcams, TPM chips, or …
Aegis Bio: Encrypted USB 3.0 drive with biometric fingerprint access
Apricorn announced the Aegis Bio 3.0, a software-free biometric USB 3.0 drive that safeguards data with secure fingerprint access and military grade 265-bit AES-XTS hardware …
Featured news
Resources
Don't miss
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer
- Man charged with stealing $65 million by exploting DeFI protocols vulnerabilities