Authentication

Keeping Your Cryptos Safe From Crooks

Why are your crypto's vulnerable?<p>What are the various forms of attack on cryptos?<p>How you keep your crypto's secure.<p>In our first article together, …

Security

Identity-driven security—Enterprise Mobility + Security

Security that travels with user identities<p>A single, common identity will help you <b>improve the protection and management</b> of user credentials and …

Security

Advanced Authentication Market 2017 Leading Growth Drivers, Emerging Audience, Segments, Sales, Profits & Analysis

"Advanced Authentication Market"<p>Advanced Authentication Market, by Solution (Single-factor, Multi-Factor), by Product (Hardware, Software, Service) – …

Security

57 Million Hit by Uber Breach: What You Should Know

Uber suffered a data breach in 2016 that exposed the names, email addresses and cellphone numbers of 57 million users and drivers, CEO Dara …

Identity Theft

Firms Fail To Properly Implement DMARC, Study Says

One in five email messages landing in inboxes come from unauthorized senders, according to a new study by ValiMail. And companies are failing to …

Security

It's time for multifactor authentication everywhere, says Centrify executive

In an interesting move by Sony that will be closely watched by the security industry, the Japanese technology giant recently filed a patent …

Security

Things I Learned Traveling to Egypt

The past few days I had an opportunity to travel to Cairo, Egypt, to present and participate in the 2017 EduForum Conference and also do a little …

Security

Microsoft

Azure Identity 101<p>This one hour training would provide an introductory session on the Identity module of Microsoft Azure. We will delve into the …

Enabling Technologies Breach Guard Suite Includes a New Threat Response Service for Account and Application Compromise

Enabling Technologies Secure Productivity in the Cloud<p>“It is no longer a question of “if”, but more a question of “when” a phishing attack will occur …

Cybersecurity

The Motherboard Guide To Not Getting Hacked

Do you want to stop criminals from getting into your Gmail or Facebook account? Are you worried about the cops spying on you? We have all the answers on how to protect yourself.<p><i>Editors note: This is Motherboard's comprehensive guide to digital security, which will be regularly updated and replaces</i> …

Security

Who Am I? Best Practices for Next-Gen Authentication

By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords.<p>There is no ignoring …

Security

Pramati Tech offers upgrade of its biometric authentication software

The Apple iPhone X’s facial ID recognition system has opened up a wide range of technology applications in the mobile biometrics industry. Taking …

Mobile

iPhone's Face ID can be hacked, but here's why nobody needs to panic

A Vietnamese company was recently able to trick Apple's facial recognition security feature, but security experts don't believe there's a big risk …

Face ID

It's Time To Get Ready For Strict New EU Privacy Regulations

Strict new consumer-privacy regulations go into effect in May 2018 for any company that does business in the European Union. These regulations, known as the General Data Protection Regulations (GDPR), spell out draconian penalties for companies that fail to comply, even if they aren’t based in the …

Privacy

Use Google's Password Alert Extension To Prevent Phishing

Phishing attacks, wherein scammers pretend to be legitimate companies in order to trick you into handing over sensitive information such as …

Identity Theft

Linux Fu: System Administration Made Easier

Linux can have a somewhat split personality. If you use it as a desktop OS, it has a lot of GUI tools, although sometimes you still need to access …

Linux

How to Add Google's Two Factor Authentication to Laravel

7* Laravel is a wonderful PHP framework that makes building applications with PHP a lot of fun.<p>One of the nice features of Laravel is how easy it is …

Web Development

Potential Gaps in Suggested Amazon Web Services’ Security Policies for MFA

During a recent review of current guidance from Amazon Web Services (AWS) for enforcing multi-factor authentication, Duo’s Production Engineering …

Cloud Computing

Considerations for multifactor authentication in healthcare Web Seminar

<b>Web Seminar</b> Considerations for multifactor authentication in healthcare<p>Nov. 7, 2017 | 2 PM ET/11 AM PT<br>Hosted by <i>Health Data Management</i><p>IT security has …

Security

Chatbot Privacy Strategy

Chatbots have become popular components of a customer experience solution. These interfaces have enabled efficient, conversational access to personal …

Chatbots

8 hard truths you have to face about your employees and password security

LastPass has released <b>The Password Exposé</b> report, highlighting the challenges of using passwords in the workplace.<p>According to the report, the …

Security

Small Business Security (Pt. 2): Building Your Business Security Program

typographyimages / Pixabay<p><b>Employees & Your Business Security Program</b><p>Last month, we discussed the importance of employee security awareness, and how …

Cybersecurity

How passwordless authentication will change the web

While the advantages of extremely strong cybersecurity are much like the benefits of living a healthy life, it is hard to truly appreciate them until they are gone.<p>Just in the next four years (2017-2021), cyber crime damage costs are expected to hit $6 trillion annually, according to Cybersecurity …

Security

Art galleries targeted by cyber-thieves

<b>Cyber-criminals appear to be targeting art galleries and dealers with an email scam that has already fooled some organisations.</b><p>The attackers broke into art dealer email accounts and sent buyers duplicated invoices with the bank account details changed.<p>Several galleries in London and the US that had …

Security

Don't Use The Same Password For Everything, You Numpties

Image: iStock<p>Be honest. Do you use the same password for multiple logins? Social media, emails, online banking? If you answered yes, you're among the …

Technology (Australia)

Google Kicks Malicious Bitcoin Exchange Apps from Play Store

[…]The post Google Kicks Malicious Bitcoin Exchange Apps from Play Store appeared first on CryptoCoinsNews.

Google

Dmarc email validation – we're doing it all wrong

The Dmarc email validation system has been around for a long time – I was speaking about its virtues at conferences over four years ago as a means to …

U.S. Dept. of Homeland Security

VMware Verify setup with Workspace - VMware Professional Services and Education Insights

JEFFREY DAVIDSON<br>Consulting Architect<p>In this blog post we will walk through the process of setting up VMware Verify and enabling it on your mobile …

Vmware

iPhone X Face ID a Facial Biometrics Catalyst?

<b>Face ID Faceoff</b><p>According to Bitglass's BYOD and Identity report released today - a survey of more than 200 IT and security professionals - 60% have …

Information Security

CredSniper - Phishing Framework which supports SSL and capture credentials with 2FA tokens

Easily launch a new phishing site fully presented with SSL and capture credentials along with 2FA tokens using CredSniper. The API provides secure …

Python Programming