Please turn on your JavaScript for this page to function normally.
Nvidia Tesla
GPU side channel attacks can enable spying on web activity, password stealing

Computer scientists at the University of California, Riverside have revealed for the first time how easily attackers can use a computer’s graphics processing unit, or …

industry
The risk to OT networks is real, and it’s dangerous for business leaders to ignore

Data from the new CyberX CyberX Global ICS & IIoT Risk Report shows major security gaps remain in key areas such as plain-text passwords, direct connections to the …

password
Stringent password rules lower risk of personal data breaches

The all-too-common practice of using the same email address/password combination to log into multiple websites can be damaging, especially for employers with many users and …

glasses
Privileged account practices are poor, and IT security teams know it

One Identity released new global research that uncovers a widespread inability to implement basic best practices across identity and access management (IAM) and privileged …

IoT
New IoT legislation bans shared default passwords

In an attempt to make it harder for bots to take over the myriad of connected devices sold in California, the state legislators have pushed through and California Governor …

Android explode
Vulnerable Android password managers make phishing attacks easier

Android password managers can be tricked into entering valid login credentials into phishing apps, a group of researchers has discovered. They have also found that Instant …

password
True password behaviors in the workplace revealed

LastPass released the “2018 Global Password Security Report,” revealing true password behaviors in the workplace and creating a benchmark that businesses can use …

password
Password inadequacy remains a top threat

New research from the WatchGuard Threat Lab revealed that 50 percent of government and military employee LinkedIn passwords were weak enough to be cracked in less than two …

face
Let user experience guide your security requirements

If you’re like most business leaders, you try to do everything you can to keep your company’s information safe. You tell your employees to use strong passwords and offer …

key
Hashcat developer discovers simpler way to crack WPA2 wireless passwords

While looking for ways to attack the new WPA3 security standard, Hashcat developer Jens “Atom” Steube found a simpler way to capture and crack access credentials …

Bitcoin
Theft of user accounts on cryptocurrency exchanges is soaring

Within a year, the number of data leaks from cryptocurrency exchanges soared by 369%, Group-IB researchers have found, and the US, Russia and China are the countries where …

stairs
Six best practices to follow in access control

Finding the right access control for your organization is best done in stages. In this way, you’ll be able to foresee costs and activities that you must tackle both on …

Don't miss

Cybersecurity news