Identity & Access

Identity & Access news, information, and how-to advice

nsa director vice adm michael rogers
windows phone biometrics

ssl secure browser security lock

Comodo's PrivDog advertising software leaves some users at risk

PrivDog, Comodo's advertising replacement software, has been flagged by researchers as a risk due to the way it handles SSL connections (HTTPS). Like Superfish, PrivDog breaks the trust and protection of HTTPS by using its own...

lenovo n20p chromebook 3qtr

Lenovo shipping laptops with pre-installed adware that kills HTTPS

Lenovo is in hot water after it was revealed on Wednesday that the company is shipping consumer laptops with Superfish (Adware) pre-installed. Security experts are alarmed, as the software performs Man-in-the-Middle attacks that...

funeral hearse

Scammers using obituary notices to acquire new victims

It's a low, ruthless way to make a living, but criminals rarely have a conscience to speak of, if at all. Still, it takes a special type of person to target those already suffering form the sudden and tragic loss of a loved one; but...

fido alliance u2f usb authentication oct 2014

Windows 10 embraces password-killing biometric authentication

Microsoft joined the FIDO Alliance in 2013 and is ready to add the password-less authentication standard into its flagship product.

student data protection ts

Is student data at risk due to out-of-date privacy laws

Members of Congress warn that an aging privacy statute hasn't kept pace with technology in the classroom and urge that restrictions be placed on third-party use of student data.

tim cook cybersecurity

Apple's Tim Cook warns that sacrificing privacy 'risks our way of life'

Apple's chief believes the personal impact of security breaches can be devastating

Wifi sign on gate

Personal weather stations can expose your Wi-Fi network

In the latest Internet of Things security blunder, personal weather station devices made by Netatmo were found sending users' Wi-Fi passwords back to the company over unencrypted connections.

05 privacy

US lawmakers introduce two bills to protect email privacy

Both bills would require law enforcement agencies to get court-ordered warrants for older stored communications

jaguar land rover

Senators to push privacy, security legislation for IoT

Some Democratic senators want new laws that mandate security and privacy measures on the Internet of Things, as concern grows over personal data collected by connected devices.

jeb bush

Jeb Bush's email dump puts constituents' personal data online

The emails posted on a Bush website included personal data such as Social Security numbers

wireless vehicle privacy security

Security, privacy gaps put U.S. drivers at risk of hacking

New standards are needed to plug security and privacy gaps in cars and trucks, according to a report released by U.S. Sen. Edward Markey.

rfid implant

Office complex implants RFID chips in employees' hands

A Swedish high-tech office complex has been offering RFID chip implants to employees of corporate tenants to access security doors, use photocopiers and even pay for food in the cafeteria.

apple store

ID theft ring allegedly stole $700,000 in Apple gift cards

Five people have been indicted in scheme that took advantage of Apple 'instant credit'

us capitol building

US takes another shot at stopping warrantless reading of emails

The bill was introduced Wednesday in the Senate and House of Representatives

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Anthem confirms data breach, but full extent remains unknown

Anthem, the nation's second largest health insurance provider, confirmed that outsiders were able to compromise an unknown number of records, including complete profiles for individuals.

bigbrother

Big Brother is watching Thailand

I first read George Orwell’s book, 1984 many years ago. I remember thinking that was such a horrible idea and it couldn’t possibly come to pass. But, the more I read the news in the last year alone I see a shift taking place. Two...

spies

How corporate spies access your company's secrets

Lower-level employees can infiltrate corporate assets and remain undetected for months, or even years. How can you safeguard your sensitive data from prying eyes?

phishing

The worst of the worst phishing scams

The depths a phishing scammer will stoop to in order to gain a buck are remarkable. Here are some of the bottom feeders to guard against in your inbox.

Load More