Identity & Access

Identity & Access news, information, and how-to advice

tunnel threat
Extreme Hacks to Be Paranoid About

Scott McNealy

Scott McNealy on privacy: You still don't have any

Big government is the biggest threat to privacy, the ex-Sun chief warns

lamp data

Common cybersecurity myths debunked

One of the greatest challenges for organizations attempting to address cybersecurity risks is the number of fundamental security myths that cause organizations to incorrectly assess threats.

greedy

Lieberman: Mandiant and Verizon wrong on unstoppable threats

Mandiant, Verizon and other cyber-forensics firms are profiting from so-called unstoppable threats like zero-day exploits and advanced persistent attacks, according to a new report from Lieberman Software.

woman with goggles 77863502

Ensuring data security with a bucket of worms and a hammer; goggles optional

Getting in the habit of destroying sensitive data in junk mail and on old drives and devices isn't just about proper use of approved technology. Sometimes what you need is creativity, a sense of humor, and a good fire extinguisher.

smartphone laptop

Report: Scam phone calls up 30%

Phone fraud aimed at finance and retail companies rose by 30 percent last year, according to a new analysis of several million calls by Pindrop Security.

Internet of things nest stoplights traffic IoT cameras

News and IoT sites flunk security and privacy tests

News and IoT websites fail security / privacy testing

kill password

FUD: Vendor claims their map-based password tool is unbreakable

Nova Spatial, the developer of a map-based authentication method called MapLogin, says their tool is unbreakable after a round of vulnerability testing with HackerOne. A bold claim, one that just isn't true based on the evidence.

single sign on tools review 1

Best tools for single sign-on

It has been a few years since we last looked at single sign-on products, the field has gotten more crowded and more capable.

security fingerprints

Expert: Time to stop relying on PII for authentication

These days, the criminals often know more of our personal details than we know ourselves -- it's time to stop asking users for their personal details and to switch to more secure methods for authentication

flashlight darkness

Windows 10 will allow apps to actively scan their content for malware

Developers will be able to have their apps talk to the locally installed antivirus programs through a new API

telephone operators 1952

'Your PC may be infected!' Inside the shady world of antivirus telemarketing

Tech support schemes have barely slowed despite legal action by the FTC

03 point of sale

Cybercriminals increasingly target point of sales systems

Trustwave highlights the difference in data-breach activity between North America and the rest of the world

snowden sign

Two years after Snowden leaks, US tech firms still feel the backlash

Continued pressure for data localization laws will hurt tech vendors, trade groups say

Network resilient

6 steps to achieve cyber resilience

It is nearly impossible to stop attacks, but the key is how quickly can you keep that attack from spreading throughout your network.

hitachi scanner

Memory scraping malware targets Oracle Micros point-of-sale customers

A new threat dubbed MalumPoS is being used against businesses in the hospitality, food and retail industries, researchers said

email stock image

How secure is your email?

Encrypted email has long been a complicated problem to solve, but a combination of Internet titans and innovative startups are working to make it practical for real people. Google has an "End-To-End" project developing a plugin for...

us capitol painting

Don't expect major changes to NSA surveillance from Congress

After passing the USA Freedom Act, many in Congress may be unwilling to extend surveillance reform

online shooter game

Researcher warns popular gaming plug-in puts millions of web users at risk from data thieves

In a demo posted on YouTube, the researcher shows how a flaw in the Unity Web Player could let an attacker access a Gmail account

Load More