Authentication

Authentication news, information, and how-to advice

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]
stopwatch seconds

computer security stock image

4 password managers that make online security effortless

Protect your passwords and other sensitive info with one of these virtual vaults

fingerprint

The dark side of biometric identification

Authorities are using your fingerprints, your face, and even your DNA to authenticate you. If you think that will stop cyber fraud, think again

passwords authentication

Facebook Account Kit opens door to a world without passwords

Developers and site owners can use Facebook's latest SDK to remove passwords from the login process

biometrics

7 steps to biometric bliss

Here's how to enable biometric security technologies in your enterprise

head sand oblivious denial

Denial Syndrome: Users don’t think they'll get hacked

People who spend a good portion of their personal and professional lives online say they care about security and privacy. But most of them don’t act like it

malware infection cyberattack

Digital certificates are helping deliver malware

When digital certs go bad, whom can you trust? Follow these procedures to get as much assurance as you can

online security

5 things you should know about two-factor authentication

Here are the basics to help you stay secure and keep hackers from stealing your identity online

submarine periscope 101722825

Google Submariner surfaces untrusted certificate authorities

Google calls out certificate authorities that can no longer be trusted and helps you steer clear of potentially fraudulent credentials

safe knob setting security

The 10 Windows group policy settings you need to get right

Configure these 10 group policy settings carefully, and enjoy better Windows security across the office

biometric data ts

Multi-factor authentication goes mainstream

Goodbye username plus password, hello smartphone plus thumbprint

magtex idynamo

Startup touts four-factor authentication for VIP-level access

Trusona’s system involves an app, a dongle, the post office, and the subject of 'Catch Me If You Can'

blockchain code

IBM goes all in on blockchain, offers cloud-based service

IBM offers a cloud-based service to help businesses set up blockchain networks and test and deploy apps

IBM z13s mainframe chip

IBM unveils z13s mainframe focused on security and hybrid clouds

The z13s, IBM's first new mainframe in almost three years, offers encryption at twice the speed as previous mid-range systems

security 2016 cybercrime

5 tips to protect your admin credentials

Credentials are the main battlefront in our ongoing computer security war. Deploy everything you have to keep them safe

20151005 Cisco headquarters sign

Cisco patches authentication, denial-of-service, NTP flaws in many products

Remote attackers can bypass authentication on Cisco RV220W wireless network security firewalls

Digital Key, security, encryption

OpenSSH patches information leak that could expose private SSH keys

Rogue or compromised OpenSSH servers can read private SSH keys from the memory of unpatched clients

fido alliance u2f usb authentication oct 2014

What FIDO credentials mean in Windows 10

Can Microsoft Windows 10 users start thinking about using biometrics to replace -- rather than secure -- passwords?

2015: The Year in Hacks

The most innovative and damaging hacks of 2015

The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead

Load More