Access Control

Access Control news, information, and how-to advice

gas station

Disney Magic Band

The magic of Disney MagicBands

Disney has turned boring physical security into convenience, better service, and an actual revenue stream…

04 phishing

Free tool automates phishing attacks for Wi-Fi passwords

The tool can disconnect Wi-Fi users and trick them into disclosing their access password to a rogue access point

21 jpmorganchase

Two-factor authentication oversight led to JPMorgan breach, investigators reportedly found

The attackers stole an employee's access credentials and used them to access a server that lacked a stronger authentication mechanism

Runaway Train

Google's work on full encryption chugs along, with Yahoo's help

Code has been migrated to GitHub to foster involvement from the wider tech community

breach bucket

IT and end users are far apart on critical data access

End users have access to a lot more sensitive data than IT departments think they do, says a new Ponemon survey

sony pictures booth

Destover variant signed with stolen Sony certificate was part of a joke

On Tuesday, researchers at Kaspersky Lab reported that a sample from the Destover family of malware – the same family used to attack Sony Pictures – was signed by a stolen Sony certificate. As it turns out, the sample was part of a...

present gift snow holiday

Security executives reveal their holiday wish lists

Do you know any security executives who say they have everything they need to keep their organizations safe from threats? Chances are you don’t.

Binary bomb with a lit fuse code developer security programming

The breach at Sony Pictures is no longer just an IT issue

Sony Pictures is in the middle of a nightmare thanks to a group of people with an axe to grind. On Monday, Sony's hackers published thousands of documents compromised during the attack, exposing the company's most important assets -...

webcam laptop

Webcam snooper now looking for a job

Insecam's creator, possibly based in Moldova, is looking for remote programming work

us uk flags

Governments act against webcam-snooping websites

Insecam, which broadcast feeds from unsecured webcams, no longer works

alliance cooperation

Microsoft: Competing AV vendors need to remember who the bad guys are

Some vendors, particularly in China, are playing hardball to get their antivirus products installed

fingerprint detail on male finger

Are fingerprints PINs or physical artifacts?

A judge’s ruling that a person can be forced to open his phone with his fingerprint ignores the fact that the fingerprint scan is just a substitute PIN, which can’t be required by law enforcement.

Cisco advises users to lock down WebEx to prevent snooping

A security researcher found potentially sensitive meetings open for anyone to join

What you should consider when choosing a password manager

Password managers offer many convenient options, but some come at the expense of security

148470916

Yahoo says attackers looking for Shellshock found a different bug

The bug has now been fixed and user data was not at risk, the company said

McAfee’s most dangerous cyber celebrities of 2014

Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware

The FBI’s big, bad identification system

The FBI’s formidable Next Generation Identification is up and running

healthcare.gov

HealthCare.gov still struggling with security

The Inspector General (IG) of the Health and Human Services Department has released a report detailing the state of security on HealthCare.gov and the results of vulnerability scans performed in April and May of this year. The...

Load More