Please turn on your JavaScript for this page to function normally.
New Citadel variant is after your master password

A good indication that the use of password managers has become a thing is the fact that cyber crooks are now trying to slurp up users’ master password for a number of …

Default ATM passcodes still exploited by crooks

Once again, ATMs have been “hacked” by individuals taking advantage of default, factory-set passcodes. This time the passcode hasn’t been guessed, or ended …

2FA: Google offers physical alternative to verification codes

Google is offering an alternative second factor for its two-step account verification option, one that has the additional advantage of thwarting phishing attacks. It’s …

Facebook trawls through paste sites for compromised credentials

In the spirit of November as National Cyber Security Awareness Month, Facebook security engineer Chris Long shared how the company discovers that some of its users’ …

Poor password habits plague our digital lifestyle

Poor password habits are putting employers at risk and losing them hundreds of thousands of pounds in lost productivity, according to new research from Centrify. According to …

Infographic: 4 authentication definitions you should know

This infographic by Wave Systems addresses current authentication problems and illustrates how to ensure that only known users access corporate resources, devices and …

Public Wi-Fi and lack of passwords lead consumer risks

93 percent of respondents believe that identity theft is a growing problem yet are not doing enough to address the issue, according to a survey conducted by Edelman Berland. …

Low confidence in breach prevention

Despite increasing numbers of data breaches and the theft and loss of more than 2 billion data records worldwide since 2013, organizations continue to believe perimeter …

Password security is not just a user problem

When high profile password compromises occur, we often spend a lot of time focusing on advice to the users – “Use strong passwords;” “Don’t reuse …

PoS vendor confirms Jimmy John’s breach was their fault

Signature Systems, the PoS system vendor that has been named as the likely point of origin of the Jimmy John’s payment data breach, has confirmed that the attacker(s) …

Payment card info of 880k Viator customers compromised

Payment card and personal information of approximately 1.4 million Viator.com customers may have been compromised in a breach that was confirmed late last Friday. The popular …

How to keep your contactless payments secure

Contactless transactions – ranging from access control and ticketing to financial payments – emerged almost two decades ago and, since then, have become widely …

Don't miss

Cybersecurity news