Please turn on your JavaScript for this page to function normally.
Many Fed smartphones have zero password protection

A new report showcases increased security risks with mobile device usage within Federal government as adoption of smartphones and other mobile devices becomes more widespread. …

Company bosses slacking on hacking

Company bosses across the UK have a complacent attitude toward cybercrime and are inviting criminal attacks due to their sloppy approach to internet security, reveals new …

High volume biometric fingerprint and iris identification

Neurotechnology released MegaMatcher Accelerator 5.0, a multi-biometric software and hardware solution designed for large-scale projects that require high-volume, high-speed …

Tokenless authentication comes to the cloud

SecurEnvoy has partnered with PasswordBank to bring the leading tokenless two-factor authentication capabilities to the PasswordBank identity management offering. Customers …

Keycard: Unlock your Mac using an iOS device

Keycard allows you to pair your iPhone or other Bluetooth enabled device with your Mac to lock and unlock your computer. It detects when you’re leaving your desk, …

Fraudulent digital certificate for Google web properties used in active attacks

A fraudulent digital certificate that could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against several Google web properties has …

Secure stateless tokenization for enterprises

Voltage Security announced its Stateless Tokenization (SST) technology, a patent-pending data security solution that provides enterprises, merchants and payment processors …

Facebook users targeted with bogus Walmart gift card offer

Christmas season should be a happy and relaxed time, but it often isn’t – especially when the money is tight. There are feasts to be planned and presents to be …

Users still have a casual attitude regarding security

A Siber Systems survey of over 700 adults from the United States, the U.K., Germany and other countries shows a significant disconnect between how individuals perceive online …

Most security pros want more desktop privilege control

While the majority of security professionals recognize the importance of limiting administrative rights on corporate desktops and laptops, many organizations continue to lag …

Six threats to watch out for in 2013

FortiGuard Labs revealed its 2013 threat predictions, highlighting six threats to watch out for next year. 1. APTs Target Individuals through mobile platforms APTs also known …

Password handling: challenges, costs, and current behavior

Online passwords are a pain, and not just when you have to type them to access your online bank account or shop at your favorite digital emporium. Password pain extends to the …

Don't miss

Cybersecurity news