Identity & Access

Identity & Access news, information, and how-to advice

Hacked, unlocked, unsafe.
032615 bulk

dell e2414hr 24 inch monitor 500x700

Dell support tool put PCs at risk of malware infection

Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products. A security researcher discovered the flaw in November and reported it to the PC manufacturer, which...

google hits misses google logo

Google catches bad digital certificates from Egyptian company

Google said Monday an Egyptian company issued digital certificates that could have been used to intercept data traffic to its services, which did not appear to have been abused.

Twitch at E3 2013

Twitch resets account passwords after hack

Users of the popular game streaming service Twitch were told they'd have to reset their stream keys and reset their passwords on Monday, after the San Francisco-based startup reported unauthorized access on some accounts.

kia uvo

Are smart cars putting our safety at risk?

Smart cars are savvy, technologically advanced, and computerized devices connected to navigation and entertainment systems, but they also record personal data and have the potential to be hacked. Who owns that information?

10 vpn

Opera buys VPN service to help protect user privacy

Acquiring SurfEasy will help protect the privacy of Opera's 350 million users, the company said

godaddy license
Special Report

GoDaddy accounts vulnerable to social engineering and Photoshop

GoDaddy serves more than 13 million customers, who in turn place 59 million domains under the registrar's management. On Tuesday, my personal account at GoDaddy was compromised. The attacker was able to gain control over my account...

edward snowden

What, me worry? Despite Snowden leaks, Americans' use of the 'Net largely unchanged

Numerous leaks illuminating the massive scale of government surveillance programs have not rattled Americans. Relatively few people have made major changes to better secure their online communications and activities, even after the...

devs freaking

Researchers find same RSA encryption key used 28,000 times

What if the key to your house was shared with 28,000 other homes? That's essentially what researchers with Royal Holloway of the University of London discovered last week while scanning the Internet to see how many servers and devices...

ssl secure browser security lock

OpenSSL mystery patches due for release Thursday

New versions of OpenSSL will be released on Thursday to patch several security vulnerabilities, one of which is considered highly serious, according to the OpenSSL Project Team.

Yahoo sign

Yahoo puts email encryption plugin source code up for review

Yahoo released the source code for a plugin that will enable end-to-end encryption of email messages, a planned data-security improvement prompted by disclosures of U.S. National Security Agency snooping.

government congress house of representatives cloud

Senate panel secretly approves cyberthreat sharing bill

A U.S. Senate committee has voted in secret to approve a controversial bill that seeks to encourage businesses to share information about cyberthreats with each other and with government agencies.

Google logo fisheye

Google error leaks website owners' personal information

A Google software problem inadvertently exposed the names, addresses, email addresses and phone numbers used to register websites after people had chosen to keep the information private.

postbox

Globe And Mail rolls out SecureDrop and why other publications should

I have been a long time reader of the venerable Canadian publication, The Globe and Mail. This is a paper that continues to turn out great content despite the massive shift to online delivery which has seen an end to so many print...

President Obama at the State of the Union 2015

Privacy advocates find Obama proposal lacking

The proposed consumer privacy bill of rights allows companies to limit consumer control, critics say

00 7spies title

7 of the most famous spies

Real world spies are continually at work, grabbing government top secrets and business trade secrets. Here are seven of the most famous / infamous spies.

mobile fingerprint identification

Biometric security is on the rise

Does biometrics have a huge role to play in corporate security programs? We asked several experts to weigh in on the pros and cons of biometric security.

apple pay

Crooks targeting call centers to further Apple Pay fraud

According to mobile payments expert, Cherian Abraham, fraud on Apple's mobile payment platform – Apple Pay – is rampant. However, Apple's hardware and software security measures remain intact; the issue at the heart of most fraud...

ssl secure browser security lock

Is it possible to determine if your Internet connection has been hijacked?

This post will describe the difference between HTTP and HTTPS connections, as well as what it means to you as you're browsing the Web. After that, we're going to talk about things that can impact HTTPS (e.g. Man-in-the-Middle...

Load More