Identity Management

Identity Management news, information, and how-to advice

New features in Windows 10 laptop
mit anonymity Riffle privacy

GDS Verify director expects online IDs for everyone in a 'small number of years'

In a talk during the opening day of London Tech Week, hosted at local government darling of digital Camden Council, programme director for Verify, Janet Hughes, outlined some of the many ways in which users will be able to access...

mammography 3d healthcare

Health IT must fix its security crisis

Poor understanding of risk leaves health providers vulnerable to attack, as malicious hackers threaten to wreak havoc

telegram ceo pavel durov

Apple vs. FBI case colors European debate about securing digital identity

Although Apple does not exhibit at Mobile World Congress, the iPhone maker influences exhibiting app developers and accessory vendors and, now, debate at the show about securing digital identity.

ibm blockchain

IBM goes all in on blockchain, offers cloud-based service

IBM offers a cloud-based service to help businesses set up blockchain networks and test and deploy apps.

e res id card

Nasdaq to use blockchain to record shareholder votes

Later this year, Nasdaq plans to record stockholders' electronic votes on its own blockchain system for companies listed on its exchange in Estonia. By digitizing the entire process, it expects to speed and simplify the proxy voting...

victim of identity theft

Identity theft victim? This site helps you reclaim your life

A revamped government website will offer consumers personalized, step-by-step guidance to reclaim their identities and untangle compromised accounts.

social security card

A tale of two women: same birthday, same Social Security number, same big-data mess

Two Florida women were born on the same day in the same state and given almost the same name. Though no one realized it at the time, it turns out they were also given the same Social Security number.

USB key

LogMeIn buying password manager LastPass

LogMeIn hopes to bring even more consolidation to the single-sign-on market with the acquisition of password management service LastPass.

light from window

Researchers find way to steal Windows Active Directory credentials from the Internet

The technique could enable attackers to attack Windows servers hosted in the cloud

cloud security lock

File sync services provide covert way to control hacked computers

File synchronization services, used to accommodate roaming employees inside organizations, can also be a weak point that attackers could exploit to remain undetected inside compromised networks.

smartphone laptop

Report: Scam phone calls up 30%

Phone fraud aimed at finance and retail companies rose by 30 percent last year, according to a new analysis of several million calls by Pindrop Security.

kill password

FUD: Vendor claims their map-based password tool is unbreakable

Nova Spatial, the developer of a map-based authentication method called MapLogin, says their tool is unbreakable after a round of vulnerability testing with HackerOne. A bold claim, one that just isn't true based on the evidence.

single sign on tools review 1

Best tools for single sign-on

Single mindednessSince we last looked at single sign-on products in 2012, the field has gotten more crowded and more capable. For this round of evaluations, we looked at seven SSO services: Centrify’s Identity Service, Microsoft’s...

security fingerprints

Expert: Time to stop relying on PII for authentication

These days, the criminals often know more of our personal details than we know ourselves -- it's time to stop asking users for their personal details and to switch to more secure methods for authentication

telephone operators 1952

'Your PC may be infected!' Inside the shady world of antivirus telemarketing

Tech support schemes have barely slowed despite legal action by the FTC

Network resilient

6 steps to achieve cyber resilience

Slogging through the aftermath of a breachImage by DVIDSHUBData breaches and cyberattacks are now commonplace. Although the scope, severity and cost of an event varies by incident, even the smallest of them can be detrimental to a...

hitachi scanner

Memory scraping malware targets Oracle Micros point-of-sale customers

A new threat dubbed MalumPoS is being used against businesses in the hospitality, food and retail industries, researchers said

haunted hallway ghost

Do departed employees haunt your networks?

Many companies have ghosts in their systems. Employees who've gone on to a better place -- say, with better pay -- but are still wandering through company files, cloud services, and social media accounts

Load More