passwords
Using social networks safely
Everyone uses social networks like Facebook, Twitter or LinkedIn. Although these fantastic sites do have their upside, they also open users up to more computer viruses and …
First credit card with password generator
Gemalto launched the first credit card to combine one-time password security capabilities with standard payment. This innovation allows banks to provide a single card that …
ElcomSoft breaks Firefox, Safari, Opera, and Chrome passwords
Elcomsoft Internet Password Breaker now retrieves cached passwords stored in a variety of email clients and Web browsers. The new update adds Mozilla Firefox, Apple Safari, …
Portable multi-boot security suite Katana 2.0 released
Katana is a portable multi-boot security suite which brings together all of the best security distributions to run from one USB drive. Katana includes distributions which …
One in five card holders use birth date as PIN
Remembering passwords may seem the biggest problem you have when managing your e-mail or social network account, but that’s only because you don’t really believe …
RSYaba: Modular brute force attacker
RSYaba allows you to run brute force attacks against various services in a similar way to Hydra and Medusa. The tool is written in Ruby so modifying the scripts is a lot …
Five tips for safe computer use
Panda Security released a list of the top five tips that computer users should follow to ensure a safe and secure online experience. With the exponential growth of social …
Integrating Hydra with Nessus
The video below shows you how to integrate custom username and password dictionaries with Hydra to your Nessus scans.
Poor password practices and how to change them
When it comes to safeguarding personal information online, many people leave their virtual keys in the front door. A survey of more than 2,500 people from the United States, …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy