authentication
Keycard: Unlock your Mac using an iOS device
Keycard allows you to pair your iPhone or other Bluetooth enabled device with your Mac to lock and unlock your computer. It detects when you’re leaving your desk, …
Fraudulent digital certificate for Google web properties used in active attacks
A fraudulent digital certificate that could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against several Google web properties has …
Secure stateless tokenization for enterprises
Voltage Security announced its Stateless Tokenization (SST) technology, a patent-pending data security solution that provides enterprises, merchants and payment processors …
Facebook users targeted with bogus Walmart gift card offer
Christmas season should be a happy and relaxed time, but it often isn’t – especially when the money is tight. There are feasts to be planned and presents to be …
Users still have a casual attitude regarding security
A Siber Systems survey of over 700 adults from the United States, the U.K., Germany and other countries shows a significant disconnect between how individuals perceive online …
Most security pros want more desktop privilege control
While the majority of security professionals recognize the importance of limiting administrative rights on corporate desktops and laptops, many organizations continue to lag …
Six threats to watch out for in 2013
FortiGuard Labs revealed its 2013 threat predictions, highlighting six threats to watch out for next year. 1. APTs Target Individuals through mobile platforms APTs also known …
Password handling: challenges, costs, and current behavior
Online passwords are a pain, and not just when you have to type them to access your online bank account or shop at your favorite digital emporium. Password pain extends to the …
Identity and access management with MyAccessLive
Aveksa announced MyAccessLive, a SaaS Identity and Access Management solution. This new offering provides integrated visibility and control of both cloud and on-premise …
IAM solution for secure email on iOS devices
Good Technology introduced Good Vault, built on the Good Trust mobile identity and access management (IAM) platform. Good Vault extends strong two-factor authentication and …
Metaforic releases software protection technology
Metaforic unveiled several new technology advancements that make it easier for software creators to protect a wide range of software (mobile, embedded, desktop, server) …
New consumer authentication service from Visa
Visa announced a new solution in its information products line up to help issuers reduce the risk of eCommerce fraud using real-time, risk-based transaction analysis. Called …
Featured news
Sponsored
Don't miss
- How open-source MDM solutions simplify cross-platform device management
- Google on scaling differential privacy across nearly three billion devices
- Lottie Player supply chain compromise: Sites, apps showing crypto scam pop-ups
- North Korean hackers pave the way for Play ransomware
- IoT needs more respect for its consumers, creations, and itself