authentication
The ubiquitous social media “buy’ button and the journey of authentication
Earlier this year two of the world’s largest social media sites, Facebook and Twitter, announced the addition of “buy’ buttons to their offerings, giving …
Moonpig shamed for not fixing customer data exposing flaw
Moonpig, a popular UK-based firm that sells personalised greeting cards, has put the personal and financial information of over 3 million of its customers in danger by using a …
FIDO Alliance prepares for industry adoption of strong authentication in 2015
The FIDO (Fast IDentity Online) Alliance published final 1.0 drafts of its two specifications – Universal Authentication Framework (UAF) and Universal 2nd Factor (U2F). …
Why now is the time for enterprises to implement context-based authentication
Security and efficiency are constant concerns in enterprise IT. The popularity of BYOD has been a boon for improved productivity and collaboration, but it has also created a …
When should unauthorized computer access be authorized?
Recently, the decentralized hacktivist collective, Anonymous, launched an attack campaign called Operation KKK (#OpKKK), targeting the racist hate group called the Klu Klux …
Complicated password rules diminish online shopping convenience
The holiday shopping season is now fully underway, but the online shopping splurge is not over yet. Over half of Europeans plan to buy their gifts online, yet many are …
Best practices in knowledge-based authentication
Knowledge-based authentication (KBA) is a methodology gaining increasing recognition for providing the identity proofing part of user authentication. A group of senior IT pros …
Google simplifies CAPTCHAs down to a single click
Tired of solving CAPTCHAs? Google has just the thing for you. The company has introduced the latest iteration of its reCAPTCHA tool, and it most cases, it will allow users to …
Intel acquires digital identity manager PasswordBox
Intel acquired PasswordBox, a provider of a cross-platform identity management service that gives users a way to log into all of their websites and applications from any …
The rise of account takeovers
Account takeover fraud is the primary means of attack from fraudsters and attack origins occurring predominantly outside of the U.S., according to NuData Security. Account …
New Citadel variant is after your master password
A good indication that the use of password managers has become a thing is the fact that cyber crooks are now trying to slurp up users’ master password for a number of …
Default ATM passcodes still exploited by crooks
Once again, ATMs have been “hacked” by individuals taking advantage of default, factory-set passcodes. This time the passcode hasn’t been guessed, or ended …
Featured news
Sponsored
Don't miss
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity
- 25 cybersecurity AI stats you should know
- Hackers backdoored Cisco ASA devices via two zero-days (CVE-2024-20353, CVE-2024-20359)
- PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389)