Identity & Access

Identity & Access news, information, and how-to advice

holiday scams
emv chip and pin

00 title smartcard checklist

10 point smartcard checklist for merchants

Just about a year from now, retail merchants who currently accept only magnetic stripe payment cards will have to start accepting chip-based smart cards as well.

webcam laptop

Webcam snooper now looking for a job

Insecam's creator, possibly based in Moldova, is looking for remote programming work

Businessman holding holiday gift box 187371991

Raising awareness quickly: Holiday tips and tricks

The holidays are here. From now until the end of the year, the retail sector will see a business boom, while organizations both large and small deal with staffers who opt to become part of the shopping rush.

us uk flags

Governments act against webcam-snooping websites

Insecam, which broadcast feeds from unsecured webcams, no longer works

uber app taxi

Uber, facing public backlash, will rethink privacy

The company is working with a DC law firm to assess its policies

smartphone encryption

Smartphone encryption – What does it mean to you?

Why are legislators considering going to Congress for access to our cell phones?

01 gargoyle

A look back at 2014's data protection nightmare

There were nearly one billion records compromised in 2014, due in part to poor supply chain protection, malicious insider access, and lackluster access management policies. Today, Salted Hash looks back at the facts and figures of a...

breach bucket
In Depth

Nearly a billion records were compromised in 2014

In first nine months of 2014, after 1,922 confirmed incidents, criminals managed to compromise 904 million records. Many of the incidents reported in 2014 were record setting, including twenty of them that resulted in the compromise...

kkk burning cross

Anonymous targets Ku Klux Klan during latest operation

After the Ku Klux Klan (KKK) promised to use lethal force against protestors in Ferguson, Mo., supporters of Anonymous launched OpKKK. On Sunday, the faceless, loosely associative collective hijacked two KKK Twitter accounts, and used...

2014 11 14 value in passwords

After this judge's ruling, do you finally see value in passwords?

Judge rules authorities can use your fingerprint to unlock your smartphone. What that means for authentication and the future of passwords.

alliance cooperation

Microsoft: Competing AV vendors need to remember who the bad guys are

Some vendors, particularly in China, are playing hardball to get their antivirus products installed

FTC website

FTC chair wants clearer disclosures to protect privacy

Many consumers are in the dark on how their data is used, the regulator said

fingerprint detail on male finger

Are fingerprints PINs or physical artifacts?

A judge’s ruling that a person can be forced to open his phone with his fingerprint ignores the fact that the fingerprint scan is just a substitute PIN, which can’t be required by law enforcement.

computer network with globe 000007092929

Employee-owned PCs are scaring enterprise IT

IT departments are worried about security risks when employees use their PCs for work purposes, but employees aren’t going to stop anytime soon.

12 surprising ways personal technology betrays your privacy

It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace.

visa paywave

Flaw in Visa cards could ring up a very large fraud

Visa's contactless payment cards in the UK allow large transactions in currencies other than the pound

child tablet

Schools keep track of students' online behavior, but do parents even know?

While schools have always collected data on students, the digital era has expanded it to the point where privacy experts say it is now out of control - and many parents are not even aware of it.

binarydrive 2

Live data used to highlight cloud-based risks

Later this week, SaaS security firm Adallom will release a report based on data collected from their own customers. The research covers an entire year, from October 2013 to 2014, and highlights a number of risks, including some that...

Load More