Please turn on your JavaScript for this page to function normally.
password
Password Reset MITM: Exposing the need for better security choices

Attackers that have set up a malicious site can use users’ account registration process to successfully perform a password reset process on a number of popular websites …

risk
Differences in personal security behaviors of US and UK workers

Wombat surveyed more than 2,000 working adults — 1,000 in the US and 1,000 in the UK — about cyber security topics and best practices that are fundamental to network and data …

OneLogin
OneLogin suffers data breach, again

OneLogin, a popular single sign-on service that allows users to access thousands of popular cloud-based apps with just one password, has suffered what seems to be a serious …

1Password
1Password Travel Mode protects passwords from border agents

1Password has created Travel Mode, a new feature that will allow users to protect their 1Password data from unwarranted searches when they travel. The need for such a feature …

17 million Zomato accounts for sale following breach

Popular restaurant search and discovery service Zomato has suffered a breach, and the attackers made off with 17 million user records. What data was compromised? These records …

password
Analysis of 500 million passwords shows what you should avoid

A dump of over 550 million username and password combinations is currently being sold on underground forums, and eager crooks are paying for the privilege to test them out …

World Password Day
World Password Day: Make the Internet a more secure place

Identity theft is one of the world’s fastest growing crimes, but adding strong authentication to your password can prevent it. Today is World Password Day, and here are some …

crowd
Making security everybody’s business goes beyond strong passwords

One of my colleagues recently shared a story that unfortunately, is not an uncommon happening among line of business application owners. He was monitoring a high value …

lips
Battling cyber security’s human condition

There is no silver bullet when it comes to cyber security. Organizations with multi-million dollar IT budgets still make headlines for being successfully breached, and even …

bomb
Phishing attacks responsible for three-quarters of all malware

With phishing now widely used as a mechanism for distributing ransomware, a new NTT Security reveals that 77% of all detected ransomware globally was in four main sectors – …

mobile device
Microsoft users can ditch password-based logins for phone sign-in 2FA

Microsoft added a new feature to its authenticator app, allowing users to sign into their Microsoft account without having to enter their password. “With phone sign-in, …

iPhone
Attackers can steal smartphone users’ PINs by tapping into data collected by mobile sensors

Researchers have demonstrated that a malicious website or app could work out smartphone users’ PINs or passwords based just on the data collected by various motion …

Don't miss

Cybersecurity news