Authentication

Is Your Voice First Smart Home Device Truly Safe and Secure?

How can consumers ensure that their voice-controlled products are secure? <i>originally appeared on</i> Quora: <i>the place to gain and share knowledge, empowering people to learn from others and better understand the world.</i><p>Answer <b>by</b> Vijay Balasubramaniyan, Co-Founder, CEO, & CTO of Pindrop, on Quora:<p>I would …

Security

Healthcare Cybersecurity: 10 Tips for Keeping Private Health Data Secure

<i>Editor’s Note: Chris Leffel is the Vice President of Network & Cloud Security at Digital Guardian, a next generation data protection platform purpose</i> …

Cybersecurity

iCloud Keychain encryption bug exposes iOS passwords, credit card numbers - TechRepublic

A flaw in iCloud's end-to-end security put iOS users' information at risk. Here's how to stay safe.<p>A largely unreported iOS security flaw undermined …

Encryption

How to enable two-factor authentication on Facebook

Keep hackers at bay with 2FA for Facebook<p>Logging in to Facebook would be a good start. Once in, go to Settings by clicking the little downwards arrow …

Security

Half of SA online transactions are not completed because the authentication is too annoying

South African banks are having to revisit their choices around authentication technology as new protocols become available and consumer behaviour …

Banking

Adopt These Five Security Measures to Keep Your Apps Secure

Recently there was a huge hue and cry in May when the WannaCry ransomware attacked the worldwide cyber security creating havoc and jeopardizing the function of close to some two and a half million computers in about 150 countries. Its prime target was computers using Microsoft Operating System. …

Security

70,000 Memcached Servers Can Be Hacked Using Eight-Month-Old Flaws

Eight months after three critical vulnerabilities were fixed in the memcached open source caching software, there are over 70,000 caching servers …

Information Security

Best password managers of 2017: Reviews of the top products

We are terrible at passwords. We suck at creating them (the top two most popular remain “123456” and “password”), we share them way too freely, and we forget them all the time. Indeed, the very thing that can ensure our online security has become out biggest obstacle to it. This is what makes a …

Security

Tomorrow’s Workplace: Flexible and Secure

Balancing workplace flexibility and enterprise security is not a new challenge for IT and technology decision-makers—but getting it right is …

The Workplace

Senator Calls For U.S. Government To Adopt DMARC

Democratic Senator Ron Wyden of Oregon sent an open letter to the Department of Homeland Security (DHS) this week calling on the U.S. government to …

Advertising Industry

Senator Demands Use Of Tool To Thwart Impersonating Emails

Sen. Ron Wyden (D-OR) has asked the Department of Homeland Security to require government-wide use of an email authentication tool to fight hackers …

Ron Wyden

Soft U2F

In an effort to increase the adoption of FIDO U2F second factor authentication, we’re releasing Soft U2F: a software-based U2F authenticator for …

Security

Poor Password: 92 Percent Of Millennials Reuse Login Security Identification

A new study finds more than eight in 10 Americans reuse their passwords, and many others continue to use inadequate security practices when it comes …

Security

Tips for mitigating password reuse risk

<b>July 2017</b><p>Every organization subject to the <i>Personal Information Protection and Electronic Documents Act</i> (PIPEDA) is required to ensure that personal …

Security

How do SMEs fight off cyber-attacks?

In this article I want to address some of the concerns that small and medium sized enterprises may have around cybersecurity, especially in the wake …

Cybersecurity

How To Speculate In ICOs And Buy Tokens: An Easy Step-By-Step Guide

<i>Be sure to check out the related story How To Invest In ICOs: 10 Financial Tips.</i><p>Speculators are throwing their 0-1% interest savings (or their astronomical bitcoin and ether gains) at initial coin offerings and token sales.<p>As mentioned in my story yesterday on financial tips for speculating in …

Bitcoin

How to Secure Your Information on AWS: 10 Best Practices

The recent Deep Root Analytics incident that exposed sensitive information of 198 million Americans, or almost all registered voters, was yet another …

Cloud Computing

Launch your own cybersecurity sprint: 30 days to improved security

Whether it’s well-publicized cyber attacks on government organizations or widespread ransomware that threatens to halt business operations, attackers …

Cybersecurity

4 Innovations in Personal Authentication Technology

There is no such thing as a strong password. In fact, just by brute force, many hackers can crack a password in less than an hour. Get a machine …

Security

What You Need to Know About Multifactor Authentication

A cyberattack could mean irreparable damage to your reputation and financial ruin for your business. Multifactor authentication can protect you.<p>As our world grows increasingly connected, cyberattacks on businesses and institutions are becoming more common.<p>In May, we saw the ransomeware WannaCry …

Cybersecurity

Google wants you to upgrade to (its) better two-factor authentication

Two-factor authentication is still the best way to keep yourself safe from password breaches, but some 2FAs are better than others.<p>Two-factor …

Security

3 Ways to Make Multi-Factor Authentication Easier for Everyone

The case for multi-factor authentication (MFA) is clear. The harder you make it for cyber attackers to get to your data, the lower your risk of a …

Security

Improved alternate authentication experience

Recently, we’ve heard feedback from customers that developers have a poor experience creating and managing their alternate authentication credentials …

Programming

Millions Of Verizon Customers’ Account PINs Leaked — Here’s Why You Should Still Have One

If you're a Verizon customer who's called customer service in the past six months, it's probably a good idea to update your PIN, or the four-digit billing password that protects your account from people trying to impersonate you over the phone.<p>An Israel-based company called Nice Systems, a Verizon …

Security

Research Shows It Only Takes 9 Minutes Before Stolen Information Is Purchased & Used

What happens when stolen personally identifiable information (PII) is made public? Recently, the Federal Trade Commission (FTC) attempted to answer …

Security

Rewrite the business of retail with the power of the cloud

<i>This is part one of a two-part series highlighting the Microsoft Cloud’s top benefits for retailers and brands.</i><p>As retailers and consumer brands move …

General Data Protection Regulation

2-factor authentication is a mess, with SMS, email methods vulnerable to determined hackers

Security

FirebaseUI auth is crashing on android

I'm trying to get authentication working with the new FirebaseUI. I'm getting the following error in LogCat<p>I'm kicking off an auth request in …

Gradle

Two-factor authentication isn't the be all, end all of cybersecurity

Five years later, the advice is starting to wear thin. Nearly all major web services now provide some form of two-factor authentication, but they …

Security

nbn™ hits the half-way mark – but has more than half of the job left

nbn™, the organisation building and operating Australia's national broadband network (NBN), has announced it's passed the half-way point of its …

Broadband