Authentication

Authentication news, information, and how-to advice

20151005 Cisco headquarters sign
Digital Key

fido alliance u2f usb authentication oct 2014

What FIDO credentials mean in Windows 10

Can Microsoft Windows 10 users start thinking about using biometrics to replace -- rather than secure -- passwords?

2015: The Year in Hacks

The most innovative and damaging hacks of 2015

The year's most significant attacks highlight how hackers are changing tactics -- and how IT security must evolve in the year ahead

Azure status page

It's not just you: Azure Active Directory is down for Europe

Office 365, Visual Studio Team Services, and other Azure services are presently unavailable in Europe due to a configuration error

victim identity theft computer problem

What you need to know about Dell's root certificate security debacle

The full scope of the incident is still unclear -- and it's not just laptops -- but there's a removal tool available

8 https

Dell security error widens as researchers dig deeper

Duo Security researchers found a second weak digital certificate on a new Dell Inspiron laptop and evidence another problematic one is circulating

spying eye

How Cisco is trying to keep NSA spies out of its gear

Cisco's suppliers have stronger security requirements, and customers will soon be able to inspect products before buying

hardware security embedded circuit board integrated controller

New Dell partnership throws doubt on traditional antivirus programs

A Dell executive says most AV products aren't effectively stopping attacks

malware bug virus security magnifying glass detection

Serious bug in widely used Java app library patched

The CSRF-style bug in Java Spring Social core library affected websites that allowed users to log in with credentials from LinkedIn, Twitter, GitHub, and Facebook, among others

smartphones mobile devices

Add next-gen authentication to apps with Authy

Recently acquired by Twilio, Authy makes it easy to send codes to users' mobile phones for that extra measure of log-in security

gold

Securing big data, a cross-technology challenge

With all this valuable data in a single place, there are many reason why hackers are going after the data lake. Securing big data is a real challenge, but one that needs to be addressed properly

active directory

First look: Microsoft Azure Active Directory Domain Services puts it all in the cloud

Here's a look at some of the ins and outs of a cloud-based method for making sure your apps have full Active Directory services -- and then some

email security

Attackers target OWA for domain credentials

Why spend time targeting Active Directory for domain credentials when Outlook Web Application is as good -- and far easier to compromise?

ipad security

Apple’s new two-factor authentication bumps up security and ease of use

Apple is slowly rolling out a revised system to let you use a second factor with iCloud and other services that use an Apple ID

virtual encryption 175562932

GitHub adds hardware-based authentication for developers

GitHub developers will now be able to log in to the code repository using YubiKey hardware keys

facebook thumbs up sign

Microsoft extends Azure Active Directory to support Facebook, Google

Businesses can use Facebook and Google login credentials to authenticate customers and partners

malware threat hack hacked bug cyberthreat

8 ways to fend off spyware, malware, and ransomware

Here are some painless precautions you can follow that might help keep you step ahead of cyber attacks

Digital Key

Credentials stored in Ashley Madison's source code might have helped attackers

The company's developers were careless with sensitive credentials like database passwords, secret keys, and authentication tokens, a security consultant found

Vinton Cerf Heidelberg Laureate Forum

Vint Cerf: 'Sometimes I'm terrified' by the IoT

Strong but finely tuned authentication will be essential to the Internet of things, according to the 'father of the Internet'

Load More