passwords
Unlock your digital world with True Key
Intel Security recently previewed True Key, a new way to unlock your digital world. It combines both password management with simple and secure multi-factor …
Skeleton Key malware makes all passwords valid
Researchers from the Dell Secureworks CTU team have unearthed a new type of malware whose goal is to allow attackers to bypass authentication on Active Directory (AD) systems …
Ars Technica readers urged to change passwords in wake of hack
In case you haven’t heard already, Ars Technica got hacked over the weekend, so if you are a subscribed reader now would be a good time to change your password. …
FIDO Alliance prepares for industry adoption of strong authentication in 2015
The FIDO (Fast IDentity Online) Alliance published final 1.0 drafts of its two specifications – Universal Authentication Framework (UAF) and Universal 2nd Factor (U2F). …
The rise of IoT 2.0 and the battle for the connected home
Sansa Security revealed the company’s Internet of Things (IoT) predictions for 2015, highlighting six of the top trends to watch out for next year. 1. The rise of IoT …
Sony hack: Lousy security, customized malware linked to previous attacks
The security picture painted by the stolen and leaked documents from Sony Pictures Entertainment becomes uglier by the day, as several companies and news outlets continue to …
Complicated password rules diminish online shopping convenience
The holiday shopping season is now fully underway, but the online shopping splurge is not over yet. Over half of Europeans plan to buy their gifts online, yet many are …
Intel acquires digital identity manager PasswordBox
Intel acquired PasswordBox, a provider of a cross-platform identity management service that gives users a way to log into all of their websites and applications from any …
New Citadel variant is after your master password
A good indication that the use of password managers has become a thing is the fact that cyber crooks are now trying to slurp up users’ master password for a number of …
Things that freak out IT security pros
Ghosts and zombies aren’t the only things coming back from the dead this Halloween. Below is a list of the top security threats that organisations should be most aware …
2FA: Google offers physical alternative to verification codes
Google is offering an alternative second factor for its two-step account verification option, one that has the additional advantage of thwarting phishing attacks. It’s …
China executes MITM attack against iCloud and Microsoft account holders
China-based Internet users are in danger of getting their iCloud and Windows Live accounts hijacked and all the information in them slurped up by the Chinese authorities, web …
Featured news
Resources
Don't miss
- Attackers exploited old flaws to breach SonicWall SMA appliances (CVE-2024-38475, CVE-2023-44221)
- New Microsoft accounts will be “passwordless by default”
- Why SMEs can no longer afford to ignore cyber risk
- Preparing for the next wave of machine identity growth
- Hottest cybersecurity open-source tools of the month: April 2025