Please turn on your JavaScript for this page to function normally.
Amazon Key
Would you let Amazon unlock your door?

Amazon recently announced the launch of the Amazon Key, allowing the Amazon delivery person to open your door in order to place your package inside, where presumably it will …

Pixie
Camera-based, single-step two-factor authentication resilient to pictionary, shoulder surfing attacks

A group of researchers from Florida International University and Bloomberg LP have created Pixie, a camera-based two-factor authentication system that could end up being a …

Terminal
Most organizations don’t have SSH security policies in place

Cybercriminals can abuse SSH keys to secure and automate administrator-to-machine and machine-to-machine access to critical business functions. According to Venafi’s research, …

password
Leaving employees to manage their own password security is a mistake

Despite the clear and present danger that weak passwords pose to organizations, many remain focused on implementing technology based on policy, not the user, to address the …

users
Inadequate IT processes continue to create major security and compliance risks

The results of a study of more than 900 IT security professionals, conducted by Dimensional Research, spotlights how common security best practices – such as timely …

Apple Face ID
How Apple’s Face ID works, learns, and protects

Apple has unveiled a new version of its privacy page and a paper throwing more light on how Face ID, its newest biometric authentication option, works on iPhone X …

Phone unlock pattern
Android unlock patterns are a boon for shoulder surfing attackers

The “swiping” unlock patterns typical for Android devices are considerably easier for attackers to discern than PIN combinations. In fact, after only one …

map
Addressing security concerns around connected ecosystems

The convergence of IoT applications with emerging technologies such as artificial intelligence, Big Data, and context-aware computing could help address current security …

Apple Face ID
Apple’s Face ID can be quickly disabled in an emergency

A week ago, Apple debuted iPhone X and Face ID, a new biometric security mechanism that replaces Touch ID. Face ID allows users to unlock their iPhone with their face. The …

Apple Face ID
iPhone X gets facial authentication, is the enterprise next?

This week, Apple debuted the iPhone X which kills the Touch ID fingerprint scanner in favor of a 3D facial scanning technology called FaceID. Soon, iPhone users will depend on …

password
Researchers reverse 320 million hashed passwords

CynoSure Prime, a “password research collective”, has reversed the hashes of nearly 320 million hashed passwords provided by security researcher Troy Hunt through …

authentication
Researchers devise app to protect PINs and passwords

Every ATM or smartphone user can attest to the discomfort of having a stranger standing close enough to observe a financial transaction — and potentially note a PIN or account …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools