Authentication

Authentication news, information, and how-to advice

abacus 164875137
Bank Vault protecting data inside

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world

stopwatch seconds

Tick-tock: Time is running out to move from SHA-1 to SHA-2

Stop procrastinating and make the switch from SHA-1 to SHA-2. You may already be getting errors -- and in 2017 things will get a lot worse

computer security stock image

4 password managers that make online security effortless

Protect your passwords and other sensitive info with one of these virtual vaults

fingerprint

The dark side of biometric identification

Authorities are using your fingerprints, your face, and even your DNA to authenticate you. If you think that will stop cyber fraud, think again

passwords authentication

Facebook Account Kit opens door to a world without passwords

Developers and site owners can use Facebook's latest SDK to remove passwords from the login process

biometrics

7 steps to biometric bliss

Here's how to enable biometric security technologies in your enterprise

head sand oblivious denial

Denial Syndrome: Users don’t think they'll get hacked

People who spend a good portion of their personal and professional lives online say they care about security and privacy. But most of them don’t act like it

malware infection cyberattack

Digital certificates are helping deliver malware

When digital certs go bad, whom can you trust? Follow these procedures to get as much assurance as you can

online security

5 things you should know about two-factor authentication

Here are the basics to help you stay secure and keep hackers from stealing your identity online

submarine periscope 101722825

Google Submariner surfaces untrusted certificate authorities

Google calls out certificate authorities that can no longer be trusted and helps you steer clear of potentially fraudulent credentials

safe knob setting security

The 10 Windows group policy settings you need to get right

Configure these 10 group policy settings carefully, and enjoy better Windows security across the office

biometric data ts

Multi-factor authentication goes mainstream

Goodbye username plus password, hello smartphone plus thumbprint

magtex idynamo

Startup touts four-factor authentication for VIP-level access

Trusona’s system involves an app, a dongle, the post office, and the subject of 'Catch Me If You Can'

blockchain code

IBM goes all in on blockchain, offers cloud-based service

IBM offers a cloud-based service to help businesses set up blockchain networks and test and deploy apps

IBM z13s mainframe chip

IBM unveils z13s mainframe focused on security and hybrid clouds

The z13s, IBM's first new mainframe in almost three years, offers encryption at twice the speed as previous mid-range systems

security 2016 cybercrime

5 tips to protect your admin credentials

Credentials are the main battlefront in our ongoing computer security war. Deploy everything you have to keep them safe

20151005 Cisco headquarters sign

Cisco patches authentication, denial-of-service, NTP flaws in many products

Remote attackers can bypass authentication on Cisco RV220W wireless network security firewalls

Digital Key, security, encryption

OpenSSH patches information leak that could expose private SSH keys

Rogue or compromised OpenSSH servers can read private SSH keys from the memory of unpatched clients

Load More