passwords

Password Reset MITM: Exposing the need for better security choices
Attackers that have set up a malicious site can use users’ account registration process to successfully perform a password reset process on a number of popular websites …

Differences in personal security behaviors of US and UK workers
Wombat surveyed more than 2,000 working adults — 1,000 in the US and 1,000 in the UK — about cyber security topics and best practices that are fundamental to network and data …

OneLogin suffers data breach, again
OneLogin, a popular single sign-on service that allows users to access thousands of popular cloud-based apps with just one password, has suffered what seems to be a serious …

1Password Travel Mode protects passwords from border agents
1Password has created Travel Mode, a new feature that will allow users to protect their 1Password data from unwarranted searches when they travel. The need for such a feature …
17 million Zomato accounts for sale following breach
Popular restaurant search and discovery service Zomato has suffered a breach, and the attackers made off with 17 million user records. What data was compromised? These records …

Analysis of 500 million passwords shows what you should avoid
A dump of over 550 million username and password combinations is currently being sold on underground forums, and eager crooks are paying for the privilege to test them out …

World Password Day: Make the Internet a more secure place
Identity theft is one of the world’s fastest growing crimes, but adding strong authentication to your password can prevent it. Today is World Password Day, and here are some …

Making security everybody’s business goes beyond strong passwords
One of my colleagues recently shared a story that unfortunately, is not an uncommon happening among line of business application owners. He was monitoring a high value …

Battling cyber security’s human condition
There is no silver bullet when it comes to cyber security. Organizations with multi-million dollar IT budgets still make headlines for being successfully breached, and even …

Phishing attacks responsible for three-quarters of all malware
With phishing now widely used as a mechanism for distributing ransomware, a new NTT Security reveals that 77% of all detected ransomware globally was in four main sectors – …

Microsoft users can ditch password-based logins for phone sign-in 2FA
Microsoft added a new feature to its authenticator app, allowing users to sign into their Microsoft account without having to enter their password. “With phone sign-in, …

Attackers can steal smartphone users’ PINs by tapping into data collected by mobile sensors
Researchers have demonstrated that a malicious website or app could work out smartphone users’ PINs or passwords based just on the data collected by various motion …
Featured news
Resources
Don't miss
- SafeLine Bot Management: Self-hosted alternative to Cloudflare
- Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054)
- Apple plugs zero-day holes used in targeted iPhone attacks (CVE-2025-31200, CVE-2025-31201)
- When AI agents go rogue, the fallout hits the enterprise
- Inside PlugValley: How this AI vishing-as-a-service group operates