authentication
Lessons learned in password security 2013
As 2013 comes to a close, it’s time to reflect on a year of change for password security and the implications for the year ahead. Large scale security breaches this year …
Authentication using visual codes: what can go wrong
Several password replacement schemes have been suggested that use a visual code to log in. However the visual code can often be relayed, which opens up a major vulnerability. …
Building an OATH-compliant authentication server for less than $100
Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon …
Easy-to-remember, difficult-to-crack passwords via visual cues
A group of researchers from Carnegie Mellon University’s School of Computer Science believe they might have solved the problem of choosing and, above all, remembering …
The iCloud keychain and iOS 7 data protection
When Apple announced iOS 7, iCloud Keychain was one of its key features. It is no doubt great for usability, but what about security? What kind of access does Apple have to …
1Password 4.1 for Mac adds new password updating, better search
Popular password manager 1Password for Mac reached version 4.1 that comes with some long-requested features, the most notable being a new Login (password) updating process. If …
F-Secure launches KEY, a secure password manager
F-Secure Key safely stores your passwords, user names and other credentials so that you can access them wherever you are through one master password. Your personal data is …
Innovations that will shape network security
Headline after headline, some company reports a cyber incident and hangs its head in shame. While it is disappointing, strong businesses have strong leaders that show us how …
Alliance dedicated to wireless biometric authentication launched
Natural Security has announced the launch and newly elected governing board of the world’s first open Alliance dedicated to secure transactions based on wireless and …
Compromised Adobe accounts include military and government users
The Adobe hack is truly gargantuan, what with all the stolen source code of a number of extremely popular software and the exfiltrated database containing user email …
Inkblots could solve problem of compromised passwords
Carnegie Mellon University computer scientists have developed a new password system that incorporates inkblots to provide an extra measure of protection when, as so often …
LastPass 3.0 comes with new design and features
Popular password manager LastPass has reached version 3.0. The new release features an updated, clean design across the LastPass browser addons, the iOS and Android mobile …
Featured news
Resources
Don't miss
- Chinese cyber spies are using Ivanti EPMM flaws to breach EU, US organizations
- TikTok videos + ClickFix tactic = Malware infection
- DanaBot botnet disrupted, QakBot leader indicted
- Is privacy becoming a luxury? A candid look at consumer data use
- Unpatched Windows Server vulnerability allows full domain compromise