Please turn on your JavaScript for this page to function normally.
Microsoft introduces multifactor authentication for all Office 365 users

In a praiseworthy move, Microsoft has extended the multifactor authentication option to all users of Office 365, its popular subscription-based online office software suite. …

By 2016, 30% of organizations will use biometric authentication on mobile devices

The consumerization of IT and business BYOD programs have resulted in potential security problems for IT leaders, according to Gartner. User expectations of a clean and simple …

Yahoo Mail accounts compromised in coordinated attack

Unknown attackers have attempted to access a number of Yahoo Mail accounts, the company warned on Thursday, and urged users to change their passwords even if they …

New details about Target breach come to light

As data dumps of cards stolen in the Target breach continue to be sold on underground cybercrime forums, and the stolen information is being used to perform unauthorised …

Which e-commerce sites do more to protect your password?

Consumers increasingly share their personal data, including payment information, with a growing number of e-retailers. The keys that protect their personal data are the …

New Snapchat CAPTCHA system hacked in record time

The revelation that usernames and phone numbers of some 4.6 million Snapchat users have been compromised marked a very bad start of the year for the company behind the popular …

Financial sector needs non-replicable, single-use credentials

Different tokens, devices, mobile phones, e-signatures, etc. are used to authenticate our e-identities. Yet, some financial institutions are still not considering the risk of …

Starbucks iOS app stores passwords in clear text

A security researcher has discovered that Starbuck’s iOS mobile application stores users’ usernames, email address and passwords in clear text, and has tried to …

Key trends for identity and access management

CA Technologies announced its predictions in identity and access management (IAM) and their impact on security professionals in 2014. “We believe that the technology …

OpenSSL site hack wasn’t the result of vulnerability exploitation

After a few days of speculations fuelled by a not clear enough explanation, the OpenSSL Foundation has confirmed that the late December defacement of its Openssl.org website …

BYOD and biometrics in the enterprise – ally or enemy?

BYOD continues its victory march as the enabler of choice among employees juggling increasingly intertwined home and work lives – for IT managers however it is the stuff …

Lessons learned in password security 2013

As 2013 comes to a close, it’s time to reflect on a year of change for password security and the implications for the year ahead. Large scale security breaches this year …

Don't miss

Cybersecurity news