Please turn on your JavaScript for this page to function normally.
credit cards secure
PCI Council wants more robust security controls for payment devices

The PCI Council has updated its payment device standard to enable stronger protections for cardholder data, which includes the PIN and the cardholder data (on magnetic stripe …

keys
Stealing login credentials from locked computers in 30 seconds or less

Security researcher Rob Fuller has demonstrated a simple way for stealing login credentials from locked computers running Windows and Mac OS X. For the attack to work, …

authentication
Iovation acquires LaunchKey, shows the future of authentication

Iovation, a provider of device-based solutions for authentication and fraud prevention, announced the acquisition of multifactor authentication company LaunchKey. The move …

Paper and phone
Can biometrics and the FIDO Alliance save us from password overload?

All the available evidence indicates our password-based security system is broken. The human brain can only remember so much and its memory capacity is being pushed to the …

BYOD
How much of a risk is BYOD to network security?

We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system …

password
Passwords, biometrics and multi-factor verification: What businesses need to know

Verifying identity is a double headache for small businesses. On the one hand, there’s the question of identity verification within your organization. You need to be sure only …

UK banks ramp up account security with voice recognition tech

British banking and financial services multinational Barclays has announced that it is introducing voice recognition technology for all personal banking customers, so that …

Review: True Key for iOS

I’ve been using 1Password for years – both their desktop and mobile products. Altough it works fine, I was curious to see what are the alternatives I can use on my …

Business ideas
Top 10 strategic technologies for government in 2016

After nearly a decade of “doing more with less,” government CIOs remain under pressure to further optimize IT and business costs while leading digital innovation …

google prompt
Google’s new authentication option: a tap on the screen

Google knowns that usability is a pre-requisite for security, so they’ve come up (yet again) with a new option within the 2-step verification feature for Google …

user
Behavior is the new authentication: A look into the future

In the next few years organizations will face extreme IT security challenges. Hackers are targeting humans instead of machines. All the most costly cyber attacks (APTs, …

Apache Milagro
Milagro: A distributed cryptosystem for the cloud

A new open source project within the Apache Incubator aims to create an alternative to outdated and problematic monolithic trust hierarchies such as commercial certificate …

Don't miss

Cybersecurity news