passwords
Name.com breach just one of many executed by HTP hackers?
Internet registrar Name.com has suffered a breach and has been informing users about it via email, requesting them to change their passwords. “Name.com recently …
Cain & Abel 4.9.44 released
Cain & Abel is a password recovery tool for Microsoft operating systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted …
How do you protect yourself in the event of a data breach?
Identity Guard warns consumers to be aware of the increased risk of identity theft and provides tips on how they can help protect themselves from becoming a victim. In a …
Poor password practices put UK businesses at risk
Britain is a sitting duck for cybercrime because employees couldn’t care less about the security of their workplace systems, according to research by Swivel Secure. …
Adults taking online password security risks
UK adults are risking their online security by using identical or easy to remember passwords on the websites they visit, new Ofcom research reveals. More than half (55%) of …
Reliance on passwords inhibits online business
A new study by the Ponemon Institute takes a deep dive into consumer perceptions around how organizations are securing their access, and what they would consider to be the …
Unlocking MS Office 2007/2010 documents
Cloud-based password unlocking service Password-Find introduced a new decrypting algorithm that unlocks half of Microsoft Office 2007/2010 Word, Excel, and PowerPoint …
Pass-thoughts as a solution to the password problem
A group of researchers from University of California, Berkeley, claims to have achieved 99 percent accuracy when using brainwave signals instead of passwords for user …
WordPress sites targeted by mass brute-force attack
US-CERT has issued an alert regarding the ongoing massive brute-force attacks against WordPress sites, warning users and administrators to keep their installation always …
WordPress.com adds 2-factor authentication option
WordPress users can finally secure their account(s) with two step authentication. The optional feature has been rolled out on Friday and is accessible to all users. To set it …
Security professionals don’t have secure mobile habits
Security professionals have embraced BYOD and they’re taking “anytime, anywhere” access to some pretty interesting locations according a new survey by Ping …
The War Z taken offline following forum, database hack
Players of The War Z, a first-person zombie survival game, have been notified of a breach of the developer’s (Hammerpoint Interactive) forum and game databases and the …
Featured news
Resources
Don't miss
- How to find out if your AI vendor is a security risk
- From likes to leaks: How social media presence impacts corporate security
- Review: The Ultimate Kali Linux Book, Third Edition
- Enzoic AD Lite Password Audit Report
- WhatsApp vulnerability could be used to infect Windows users with malware (CVE-2025-30401)