Authentication

Okta Wants to Be an Identity Service for Developers

If you’ve come across the Okta set of cloud identity services, you’ve probably thought about it as an IT tool. Administrators can use it to manage …

Software Development

Watch: Researchers exploit SMS two-factor authentication to steal Bitcoins

In theory, two-factor authentication (2FA) is an excellent method to keep your accounts secure. The problem with this security method, however, is that it typically relies on text messaging to send you a code which you then enter to unlock your account. While this seems fine on the surface, there …

Security

How Apple's New Facial Recognition Technology Will Change Enterprise Security

Expect a trickle-down effect, as tech similar to Face ID becomes offered outside of Apple.<p>Apple's new Face ID technology promises a security …

Touch ID

All That's Needed To Hack Gmail And Rob Bitcoin: A Name And A Phone Number

Hackers have proven just how urgently a gaping flaw in the global telecoms network, affecting what’s known as Signalling System No. 7 (SS7), needs to be fixed. In a video demonstration, shown to <i>Forbes</i> ahead of publication today, benevolent hackers from Positive Technologies were able to take …

Security

Equifax says it was hacked in March, months before latest breach

SAN FRANCSICO – Credit reporting company Equifax suffered a breach in March, two months before the massive breach that hit as many as 143 million people, which was disclosed earlier this month.<p>The March breach was reported Monday by Bloomberg.<p>The 143 million person began in mid-May and was …

News (U.S.)

Equifax image is battered by data breach as consumers feel violated

The Equifax brand is under assault.<p>Equifax's reputation with consumers has fallen at a quicker pace than other companies hit by similar data breaches in recent years, according to data from YouGov BrandIndex released Monday.<p>The credit bureau has suffered a major public relations hit since Sept. 7, …

Money

Why Relaxing Our Password Policies Might Actually Bolster User Safety

Recent guidance from NIST may seem counterintuitive.<p>Despite the publicity about breaches, ransomware, and the like, we're still using some pretty …

Security

Decoding two-factor authentication: which solution is right for you?

TL;DR: Today Access Now is releasing an infographic to help you choose which two-factor authentication method is right for you.<p>If you’ve been reading …

Security

Phishing On The Rise, CEOs Most Likely To Be Spoofed

Cybercriminals are shifting tactics and prioritizing phishing-related scams, according to a recent RiskIQ report.<p>Malvertising activity -- described …

Advertising Industry

iPhone 8 or iPhone X: Which one should CIOs prefer for their users?

Apple just announced two new series of the iPhone. Here are the top considerations that IT leaders must account for when thinking of supporting the …

Apple

HHS CISO: 3 things hospitals should do right now to strengthen cybersecurity

These are the steps infosec pros should be taking today.

Cybersecurity

Announcing Windows 10 Insider Preview Build 16288 for PC & Build 15250 for Mobile

Hello Windows Insiders!<p>Today we are releasing Windows 10 Insider Preview Build 16288 for PC to Windows Insiders <b>in the Fast ring only</b> (not Skip …

Microsoft Windows

Biometrics: A Stepping-Stone To Eliminating The Password Forever

Once thought of as exotic and futuristic, the use of biometrics as a means of authentication is quickly becoming mainstream. The concept is based on the fact that each person is unique and can be identified by his or her intrinsic physical or behavioral traits. This premise can serve as a powerful …

Security

AT&T, Verizon, T-Mobile, and Sprint are working together to improve mobile two-factor authentication

When it comes to two-factor authentication, SMS isn't exactly the most secure method. Thankfully, AT&T and Verizon just announced a partnership today …

Security

AT&T, Sprint, T-Mobile and Verizon join forces to develop secure two-factor system

The nation’s top four wireless carriers may hate each other but they’re showing a willingness to work together in the name of security.<p>AT&T, Sprint, …

Mobile

Logging in with your phone could get more secure in 2018

Authentication is a thorny problem. Passwords can be stolen, face recognition can be spoofed and personal identification information can be hacked. The four biggest phone network companies formed an alliance so your phone can help make it better, though.<p>Verizon, T-Mobile, Sprint and AT&T hope to …

Security

Verizon, ATT, T-Mobile, Sprint team up (for mobile security)

Here’s something you probably weren’t expecting: Verizon, AT&T, T-Mobile, and Sprint have announced that they’re all joining forces. No, they aren’t …

Telecoms

Verizon, T-Mobile, AT&T and Sprint are building a unified user authentication system

In the past couple of years we’ve seen security in devices get better and better. With the introduction of fingerprint readers, iris scanning, and other biometric authentication systems, our phones are more secure than ever. Still, there are some that think these devices are still not as secure as …

T-Mobile

When one size doesn't fit all in cloud security

<b>Sponsored</b> You want to move from an on-premises Office suite to Office 365 in the cloud. It'll save you money in the short term and free you from …

Security

How banks are coping with New York’s cybersecurity rules

The first compliance deadline fell last week for the state’s strict new regulation. Banks are struggling with certain elements, such as multifactor …

Cybersecurity

Stronger banking security needed to protect against cyber-criminals

​JOHANNESBURG - The financial services industry is under increased threat from cyber-criminals who use ingenious methods to attack institutions and …

Banking

IDG Contributor Network: New cyber regulations highlight need for virtual CISOs

The question of responsibility for cyber-attacks has been a gray area for the last few years. Regulators have treated data breaches and hacking …

Cybersecurity

How Intel Core chips could take over two-factor authentication from your phone

Password manager Dashlane is one of the first consumer-facing companies to take advantage of a little-known feature within Intel’s 8th-generation Core chips that could become much more popular: enabling two-factor authentication with just your PC, and not your phone.What’s known as Universal Second …

Security

User Authentication For Web And iOS Apps With AWS Cognito (Part 2)

In today’s digital landscape, developers constantly need to be adding new tools to remain competitive and at the top of their craft. If you regularly …

Cloud Computing

Office 365 account compromise attempts on the rise

Office 365, Microsoft’s software-as-a-service productivity software suite popular with corporate users, is increasingly becoming attackers’ preferred …

Security

'Open and accessible' spambot server leaks 711 million records

Many duplicates in River City-rivalling data spillA spambot operation has leaked 711 million email addresses in a massive data breach.…

Security

OTA Submits CAN-SPAM Recommendations To FTC

The Online Trust Alliance (OTA), a non-profit and Internet Society (ISOC) initiative, submitted recommendations to the Federal Trade Commission on …

Advertising Industry

Okta expands multi-factor authentication as it diversifies beyond single sign-on

Okta customers who use the identity provider for single sign-on capabilities will get basic multi-factor authentication added to their service for free, as part of a suite of updates the company announced today.<p>Starting now, all Okta Identity Cloud customers will be able to set up user accounts to …

Security

Okta Builds Identity Authentication As A 'Layer', In The Cloud

The industry is currently fond of talking about the ‘end of passwords’ as a means of identity authentication security. This is argued to be possible if we start to use technologies like behavioral biometrics where security is based upon the computer recognizing not just a log in name and password, …

Security

BrandPost: Blurred Boundaries and New Methods: What’s Trending in Authentication

Remember when hardware tokens and complex passwords were the only ways to deliver secure access? Today, mobile and cloud applications are driving …

Security