Identity & Access

Identity & Access news, information, and how-to advice

Internet of Things

New malvertising campaign hit visitors of several high-profile sites

Attackers redirected users to Web-based exploits by pushing malicious advertisements onto popular sites, researchers from Fox-IT said


Report: NSA built 'Google-like' search engine for metadata

ICReach sought to provide easy access to billions of pieces of communications metadata

Attack targets firms from the automobile industry in Europe

Attackers are sending emails containing a new information-stealing Trojan program to customer service departments, Symantec researchers said

27 million South Koreans affected by data breach

South Korean authorities have revealed details surrounding massive data breach that impacts 27 million people aged 15-65. Moreover, local media is reporting that 16 people involved with the scheme were arrested, and that the full...

Healthcare organizations still too lax on security

Data breach at Community Health is symptom of broader problem, security experts say

piggy bank 164630734

Stolen data allegedly used by Irish credit unions to find debtors

Private investigators, said to be working on behalf of credit unions in Ireland, didn't need to be social engineering experts in order to convince staff at the Department of Social Protection (DSP) and other government agencies to...

jayrockefeller

Senator questions airlines' data privacy practices

Jay Rockefeller raises concerns about airlines collecting and sharing personal information

security risk

SDS still young, but very much on the rise

Offering increased protection and a simplified approach, software-defined security is shaping up to be the next big thing in IT security

towerbridge

British spy agency scanned for vulnerable systems in 32 countries, German paper reveals

Heise Online reveals top-secret details about the GCHQ's 'Hacienda' program

zeus

New Gameover Zeus botnet keeps growing, especially in the US

A new Gameover Zeus malware variant has infected over 10,000 systems so far, researchers say

shutterstock 198227276

How to reduce the risk of insecure firmware in office gear

A firmware study that found dozens of security problems affecting more than 120 products is a reminder to businesses to segregate and control access to networked office gear, experts say.

Amazon protects its virtual desktops with two-factor authentication

The company's WorkSpaces service can be used with hardware tokens from Gemalto

Messenger app users worry how Facebook uses a device's phone, camera

Facebook ignited a flood of criticism last week when it began requiring mobile users to load its Messenger app for Android and iOS separate from its basic Facebook app

China's Xiaomi faces privacy hurdles ahead of international expansion

Xiaomi apologized on Sunday for causing privacy concerns related to its phones

Seven ways DARPA is trying to kill the password

From analyzing the way you walk to your heartbeat, these futuristic authentication systems could be here soon

blackhatlogo

Salted Hash: Live from Black Hat USA (Day 3)

Thursday is the day of the week that Hacker Summer Camp takes on some changes. The corporate side of things starts to wind down, and the Black Hat attendees are likely heading to one of two places - DEF CON or home.

Network-attached storage devices more vulnerable than routers, researcher finds

A security review found serious vulnerabilities in 10 popular NAS systems

erp

ERP: Protecting the pipeline by focusing on business-critical platforms

In early July, news circulated that a Chinese manufacturer stood accused of tampering with the firmware of hand-held scanners in order to target chain resources. So what can organizations do about this type of threat, when they're...

wipeout
In Depth

Why your online identity can never really be erased

A ruling by a European Court may make it more difficult to find certain information that people claim is 'inadequate ... irrelevant ... or excessive,' but that doesn't mean it will disappear. Some critics, who call the ruling...

Load More