authentication
World’s largest biometric database
In the last two years, over 200 million Indian nationals have had their fingerprints and photographs taken and irises scanned, and given a unique 12-digit number that should …
Voice biometrics for mobile devices
Nuance announced Dragon ID, a voice biometrics technology that lets people quickly and easily unlock mobile devices and consumer electronics just by using their voice. Dragon …
UGNazi attack 4chan, CloudFlare
Visitors to 4chan have recently been automatically redirected to the Twitter account of hacker group UGNazi, and an investigation into the matter revealed that the attack has …
AuthenTec releases Eikon mini USB fingerprint reader
AuthenTec introduced the Eikon mini USB fingerprint reader. The ergonomically designed Eikon mini integrates AuthenTec’s AES2660 smart fingerprint sensor and was …
(IN)SECURE Magazine issue 34 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 34 has been released today. Table of contents: …
Birdstep unveils SafeMove SSL VPN
Birdstep launched its SafeMove Clientless SSL VPN, offering easy, secure and efficient remote access to the enterprise network. While Birdstep’s full SafeMove Mobile VPN …
SaaSID launches Cloud Application Manager
SaaSID unveiled Cloud Application Manager (CAM), security software that provides single sign on (SSO), application shaping and auditing of any applications accessed using a …
LOK-IT Secure Flash Drive
After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based …
Password creation policies are the enemy of secure passphrases
Commenting on reports that a security developer has concluded that password-creation policies are the enemy of secure passwords, SecurEnvoy co-founder Steve Watts says that …
Facial recognition technology for user authentication
DigitalPersona announced the latest release of its enterprise software which builds upon its existing support for a wide variety of user authentication methods by including …
Intel strengthens security of its Core vPro platform
Intel announced the availability of its 3rd Generation Intel Core vPro processor-based platforms for business and intelligent systems. New capabilities embed security at every …
The creation and evolution of the superuser
When I think about managing identities and privileges within an organisation, one of my favorite analogies for the whole privileged identity lifecycle is biblical. Everything …
Featured news
Resources
Don't miss
- Why AI code assistants need a security reality check
- GPS tracker detection made easy with off-the-shelf hardware
- 91% noise: A look at what’s wrong with traditional SAST tools
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)