Please turn on your JavaScript for this page to function normally.
Apple to introduce two-factor authentication option in iOS 9 and OS X El Capitan

Starting with OS X 10.11 (“El Capitan”) and iOS 9, Apple will introduce a two-factor authentication option that will replace the current two-step verification …

Emojis instead of PIN codes as an alternative for forgetful users

For years now companies have been trying to come up with alternatives to passwords and passcodes that will be easier to remember (for users) and more difficult to guess or …

Brain’s reaction to certain words could replace passwords

You might not need to remember those complicated e-mail and bank account passwords for much longer. According to a new study, the way your brain responds to certain words …

How to turn on two-factor authentication on over 100 popular online services

TeleSign launched Turn It On, a new campaign featuring a guide to two-factor authentication and providing step-by-step instructions for turning on 2FA for over a 100 popular …

World map
Strengthening trust in a highly connected world

As consumers, we increasingly expect anytime-anywhere access and personalized service, whether online at home, on-the-go with mobile devices, or in a store or branch location. …

Entrust Datacard
Product spotlight: Entrust IdentityGuard

All organizations require the means to authenticate the identities of users, machines or mobile devices for access to sensitive networks, services, applications or facilities. …

Yahoo develops cheap, effective biometric smartphone authentication

A group of Yahoo researchers have demonstrated that apart from fingerprints, other parts of the human body, such as ears, fists, palms and fingers, can also be successfully …

Chrome extension protects your Google account from phishers

Google developers have created Password Alert, an open source Chrome extension that aims to prevent users from entering their Google password in a phishing site or, …

Why you should steer users towards less predictable passwords

As users are instructed to create ever more complex passwords, and developers are starting to use encryption methods more difficult to crack than standard hashing functions, …

Cloud
Protecting identities from the endpoint to the cloud

At RSA Conference 2015, RSA launched the RSA Via family of Smart Identity solutions, engineered to combine authentication, identity and access management, and identity …

Behavioral biometrics: The password you can’t forget

This year’s Mobile World Congress featured more biometrics technology than ever before, with the launch of Google’s Android Pay and Samsung Pay both unveiling …

Organizations have little control over privileged access

Even though nearly half of IT decision makers admit they have employees with access rights not necessary to their current role, more than one out of four companies indicated …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools