passwords

GPU side channel attacks can enable spying on web activity, password stealing
Computer scientists at the University of California, Riverside have revealed for the first time how easily attackers can use a computer’s graphics processing unit, or …

The risk to OT networks is real, and it’s dangerous for business leaders to ignore
Data from the new CyberX CyberX Global ICS & IIoT Risk Report shows major security gaps remain in key areas such as plain-text passwords, direct connections to the …

Stringent password rules lower risk of personal data breaches
The all-too-common practice of using the same email address/password combination to log into multiple websites can be damaging, especially for employers with many users and …

Privileged account practices are poor, and IT security teams know it
One Identity released new global research that uncovers a widespread inability to implement basic best practices across identity and access management (IAM) and privileged …

New IoT legislation bans shared default passwords
In an attempt to make it harder for bots to take over the myriad of connected devices sold in California, the state legislators have pushed through and California Governor …

Vulnerable Android password managers make phishing attacks easier
Android password managers can be tricked into entering valid login credentials into phishing apps, a group of researchers has discovered. They have also found that Instant …

True password behaviors in the workplace revealed
LastPass released the “2018 Global Password Security Report,” revealing true password behaviors in the workplace and creating a benchmark that businesses can use …

Password inadequacy remains a top threat
New research from the WatchGuard Threat Lab revealed that 50 percent of government and military employee LinkedIn passwords were weak enough to be cracked in less than two …

Let user experience guide your security requirements
If you’re like most business leaders, you try to do everything you can to keep your company’s information safe. You tell your employees to use strong passwords and offer …

Hashcat developer discovers simpler way to crack WPA2 wireless passwords
While looking for ways to attack the new WPA3 security standard, Hashcat developer Jens “Atom” Steube found a simpler way to capture and crack access credentials …

Theft of user accounts on cryptocurrency exchanges is soaring
Within a year, the number of data leaks from cryptocurrency exchanges soared by 369%, Group-IB researchers have found, and the US, Russia and China are the countries where …

Six best practices to follow in access control
Finding the right access control for your organization is best done in stages. In this way, you’ll be able to foresee costs and activities that you must tackle both on …
Featured news
Resources
Don't miss
- Signal blocks Microsoft Recall from screenshotting conversations
- The hidden gaps in your asset inventory, and how to close them
- CTM360 report: Ransomware exploits trust more than tech
- Lumma Stealer Malware-as-a-Service operation disrupted
- Data-stealing VS Code extensions removed from official Marketplace