Please turn on your JavaScript for this page to function normally.
Review: True Key for iOS

I’ve been using 1Password for years – both their desktop and mobile products. Altough it works fine, I was curious to see what are the alternatives I can use on my …

key
Shard: Open source tool checks for password re-use

Security researcher Philip O’Keefe has created a tool that allows users to check whether they have reused a password on multiple accounts. The impetus behind the …

Apple
Keydnap malware opens backdoor, goes after passwords in OS X keychain

ESET researchers have revealed the existence of another new piece of malware aimed at Mac machines and users: Keydnap. Keydnap has the ability to steal passwords and keys …

hole
Half of SMBs experienced a breach in the past year

More than 50% of SMBs have been breached in the last 12 months, according to a North American study by the the Ponemon Institute. No business is too small to evade a cyber …

GoToMyPC
GoToMyPC remote desktop service resets all passwords in wake of attack

GoToMyPC, a remote computer administration service offered by Citrix, has forced a password reset for all customers in the wake of what they call a “very sophisticated …

GitHub
GitHub accounts compromised in wake of reused password attack

Three days ago, an unknown attacker has been spotted trying to break into a large number of GitHub accounts and has managed to access some of them, Shawn Davenport, Vice …

Another “historic” hack and leak: 51 million iMesh accounts for sale

Email addresses and login credentials of some 51 million users of the recently defunct iMesh file sharing service are being sold online for 1 bitcoin. The seller is …

Hashcat
Developing Hashcat, a tool for advanced password recovery

As general-purpose computing on graphics processing units (GPGPU) became more viable around 2009, professional software developer Jens “atom” Steube wanted to …

password
32m Twitter login credentials stolen from users

Leaked Source has added 32,888,300 records of Twitter users to its repository of leaked data. The source of the batch is a user who goes by the alias …

password
Microsoft bans common passwords

If you’re using the Microsoft Account service to sign into the various services offered by the company, and you tried to set up a too commonly used password, you have …

user
Behavior is the new authentication: A look into the future

In the next few years organizations will face extreme IT security challenges. Hackers are targeting humans instead of machines. All the most costly cyber attacks (APTs, …

LinkedIn
LinkedIn users’ data on sale on the dark web

A hacker has put up a batch of info about 167 million LinkedIn accounts for sale on dark web marketplace The Real Deal. Of these, some 117 million records contain email …

Don't miss

Cybersecurity news