Authentication

10 Useful Wordpress Admin Plugins for Better Control

It has plugins for social media, e-Commerce, SEO, blog posts and much more. WordPress has also got a set of plugins that will enable you to have a …

Web Design

Can Windows be used with Apple’s two-factor authentication?

Sandie Baron has a iPad and a Windows 10 system, and wondered how to use Apple’s two-factor authentication (2FA) with that setup. Apple doesn’t offer …

iOS

New infosec products of the week​: May 26, 2017

Independent expert advice on Data Protection and GDPR<p>For many organisations, the General Data Protection Regulation (GDPR) now mandates the …

Cybersecurity

The 6 best password managers

Thanks to the continuous barrage of high-profile computer security scares and reports of cloud-scale government snooping, more of us Internet users …

Encryption

Walking could form part of biometric ID for wearables

By analyzing the gait of a person's walk, researchers from the CSIRO have created both a unique way to provide power to wearable devices and a new …

Security

Hands On With Google And Microsoft Authenticator Apps

One of the primary vehicles used by bad guys to access our systems is stealing log-in credentials in order to impersonate real users. All the …

Security

How to Enable Two-Factor Authentication on Confidential Documents

<i>This is the twelfth installment in our</i> <i>How-To</i> <i>series: an ongoing set of product posts full of tips and tricks for getting the most out of Vera.</i><p><b>Public.</b> …

Security

Credential-Stuffing Threat Intensifies Amid Password Reuse

Employees who reuse logins on multiple websites drive the impact of third-party breaches as hackers use credential stuffing to compromise more …

Security

Security Think Tank: 10 control areas to mitigate against malware attacks

The WannaCry ransomware attack at the beginning of May 2017 has brought home to many organisations just how vulnerable they are to malware.<p>According …

Cybersecurity

iCloud security changes

This Macworld article is useful information for those who use iCloud for app syncing.<p>If you use iCloud for email, calendar events, or contacts with …

Security

Vera Branching Out to Integrate with Duo Security, RSA SecureID, Twilio

Data-centric security automator Vera continues to branch out and provide its second layer of security to key cloud platforms.<p>Back in January, the …

Enterprise Tech

Tech: 7 ways to protect social media and online app accounts from hackers

With a significant rise in cyber attack, hacking and stealing personal information has become a daily phenomenon. Today, user records from India’s …

Security

Release Resources: Release Notes New Features

Lightning for Gmail<p>Experience the power of Salesforce Lightning CRM, now in Gmail.<p>See the power of your Salesforce Lightning CRM and the Lightning …

CRM

Lessons learned from the WannaCry ransomware attack

The WanaCry ransomware was aptly named because anyone impacted would “wanna cry.” The attack, which locked hundreds of thousands of users out of …

Security

Azure users told they're not WannaCrypt-proof

Microsoft Windows users already know what to do to defeat WannaCrypt (unless they've been asleep for a week). Now the company's published its advice …

Security

WannaCrypt attacks

The recent global ransomware attack, known as WannaCrypt, has brought forward the importance of running a well secured infrastructure. Whether or not …

Information Security

The Wide-Ranging Impact of New York's Cybersecurity Regulations

New York's toughest regulations yet are now in effect. Here's what that means for your company.<p>One of the harshest cybersecurity regulations to hit …

Cybersecurity

Web Developer Security Checklist

Developing secure, robust web applications in the cloud is <b>hard, very hard</b>. If you think it is easy, you are either a higher form of life or you have …

Web Design

Six Steps To Keep Your Financial Information Secure

While technology adds many options for ease of access to funds and other features to make customers’ lives easier, it also creates new opportunities for black hats to get a hold of financial information, or even the finances themselves. Mobile apps, budgeting tools and online payment systems have …

Security

A Beginner’s Guide to Protect Your WordPress Site

WordPress is one of the most popular content management systems.<p>In fact, this publishing platform is now used by more than 27.5% of the top 10 …

Web Design

The impact of authentication on health digital resources

Adams, Anne (2005).<p>The impact of authentication on health digital resources.In: <i>HDL 2005: Healthcare Digital Libraries Workshop held in conjunction</i> …

Security

Making multifactor authentication a reality

Modern, standards-compliant, multifactor authentication is one of the most effective ways organizations can reduce cyber risk, a new report says.

Government Technology

'You can tell by the way I use my walk...'

Technology of Business editor<p><b>We're losing the battle against fraudsters who are stealing or guessing our usernames and passwords with increasing success. So could analysing the quirky ways we use our devices - even the way we walk - provide an additional line of defence?</b><p>These days you can't walk …

Security

Biometric convenience could become consumers’ worst nightmare

New findings from Juniper Research claims the number of mobile payments authenticated by biometrics will rise to nearly two billion this year, but …

Telecoms

Intel remote management flaw enables hijacking of systems using any authentication string

C-suite Leadership

Hackers intercept Two Factor Authentication messages to empty bank accounts

A known vulnerability in a networking protocol used by mobile phone network providers has been exploited by hackers to intercept Two Factor …

Security

You know your password is terrible. Here's how to fix it

Photo by Pawel Kopczynski/Reuters<p>The first Thursday in May is World Password Day, but don’t buy a cake or send cards. Computer chip maker Intel …

Cybersecurity

Why it's so hard to remember your password—and how to do it better

<i>This article was originally published on The Conversation. Read the original article.</i><p>The first Thursday in May is World Password Day, but don’t buy a …

Cybersecurity

Bank robbers exploited SS7 weaknesses to drain 2SV-protected accounts

Attackers abused SS7 to redirect customers’ SMS text messages to phone numbers under their control.<p>| May 5, 20171:19 am | Filed under: Malware, …

Security

World Password Day: How To Create A Secure Password

Thursday is World Password Day, a “holiday” of sorts on which internet users are encouraged to increase their personal security by improving their …

Security