Authentication news, information, and how-to advice

victim identity theft computer problem
8 https

spying eye

How Cisco is trying to keep NSA spies out of its gear

Cisco's suppliers have stronger security requirements, and customers will soon be able to inspect products before buying

hardware security embedded circuit board integrated controller

New Dell partnership throws doubt on traditional antivirus programs

A Dell executive says most AV products aren't effectively stopping attacks

malware bug virus security magnifying glass detection

Serious bug in widely used Java app library patched

The CSRF-style bug in Java Spring Social core library affected websites that allowed users to log in with credentials from LinkedIn, Twitter, GitHub, and Facebook, among others

smartphones mobile devices

Add next-gen authentication to apps with Authy

Recently acquired by Twilio, Authy makes it easy to send codes to users' mobile phones for that extra measure of log-in security


Securing big data, a cross-technology challenge

With all this valuable data in a single place, there are many reason why hackers are going after the data lake. Securing big data is a real challenge, but one that needs to be addressed properly

active directory

First look: Microsoft Azure Active Directory Domain Services puts it all in the cloud

Here's a look at some of the ins and outs of a cloud-based method for making sure your apps have full Active Directory services -- and then some

email security

Attackers target OWA for domain credentials

Why spend time targeting Active Directory for domain credentials when Outlook Web Application is as good -- and far easier to compromise?

ipad security

Appleā€™s new two-factor authentication bumps up security and ease of use

Apple is slowly rolling out a revised system to let you use a second factor with iCloud and other services that use an Apple ID

virtual encryption 175562932

GitHub adds hardware-based authentication for developers

GitHub developers will now be able to log in to the code repository using YubiKey hardware keys

facebook thumbs up sign

Microsoft extends Azure Active Directory to support Facebook, Google

Businesses can use Facebook and Google login credentials to authenticate customers and partners

malware threat hack hacked bug cyberthreat

8 ways to fend off spyware, malware, and ransomware

Here are some painless precautions you can follow that might help keep you step ahead of cyber attacks

Digital Key

Credentials stored in Ashley Madison's source code might have helped attackers

The company's developers were careless with sensitive credentials like database passwords, secret keys, and authentication tokens, a security consultant found

Vinton Cerf Heidelberg Laureate Forum

Vint Cerf: 'Sometimes I'm terrified' by the IoT

Strong but finely tuned authentication will be essential to the Internet of things, according to the 'father of the Internet'

changed priorities

10 years on: 5 big changes to computer security

In the 10 years since Security Adviser debuted, the threats have changed -- as have the defenses, and no one can argue computer security is safer overall

Bug exposes OpenSSH servers to brute-force password guessing attacks

The keyboard-interactive authentication setting could allow for thousands of password retries, a researcher found

classroom ipads students teach learn lesson

Waste of time or wise investment? Two sides of user security training

Cynics say no amount of security training can prevent users from slipping up and bulletproof defenses are the only answer

whisper shh quiet mouth lips men antique vintage secret

Microsoft quietly pushes 17 new trusted root certificates to all Windows systems

The aging foundation of Certificate Authorities shows yet another crack as security experts are caught unaware

Fingerprint sensors on their way to more smartphones

Cheaper sensors and broader software support will make fingerprint authentication more accessible to app developers and service providers

Load More