Passwords

Passwords | News, how-tos, features, reviews, and videos

Facebook Data Debacle - Android
hot and cold fire and ice clash temperature

login password - user permissions - administrative control

How to protect against poor Windows password practices

Employees will reuse passwords for work systems for their personal online accounts. Here's how to set up multifactor authentication in a Windows environment to reduce the risk of password compromise.

5 password best practices unique passwords authentication

Password managers remain an important security tool despite new vulnerability report

Experts downplay discovery of a vulnerability that can expose passwords in a computer's memory. Hackers likely to take easier paths to stealing passwords.

5 password best practices unique passwords authentication

The best password advice right now (Hint: It's not the NIST guidelines)

Short and crackable vs. long, complex and prone to reuse? The password debate rages on, but this columnist has a change of mind.

a hand holding a key moves toward an @ symbol with many locks

I can get and crack your password hashes from email

Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability.

login password - user permissions - administrative control

Using a password manager: 7 pros and cons

This veteran security pro feels more secure now that he's using a password manager, but there are still risks.

keys authentication

What is the future of authentication? Hint: It’s not passwords, passphrases or MFA

Passphrases and MFA are not password saviors. Ultimately, authentication will rely on algorithms to determine user identity and detect fraudulent actions.

passwords

Are long passphrases the answer to password problems?

Passphrases can be more secure than passwords, but there are limitations and hackers will eventually master cracking them.

intro security vulnerability

6 ways companies fail at security fundamentals

A new report suggests many organizations are failing in the basic cyber hygiene efforts and leaving themselves exposed to hackers.

1 weakest link broken rusted chain security breach hacked

10 topics every security training program should cover

A thorough end-user education program is a necessary weapon in the battle to protect your perimeter. These 10 topics are the baseline of what to include in an awareness training program.

facial recognition access identification biotech

Why you shouldn’t use your face as your password

You can now use your face to lock your smartphone. But just because you can doesn’t mean you should.

password security - locked mobile phone in hand shows lockscreen

Does the answer to better security lie in password-less experiences?

Truly password-less authentication that lets users control personal details is key to avoid identity theft and data breaches.

facial recognition - biometric security identification

Identity eats security: How identity management is driving security

New intelligent identity management systems are changing the way organizations authenticate users and devices, and they’re making identity the new security perimeter.

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

login password - user permissions - administrative control

Are regulations keeping you from using good passwords?

Most companies are using password "best practices" that are out of date and ineffective. Regulations are getting in the way of changing them.

TSB Phishing page

Salted Hash – SC 02: What a TSB phishing attack looks like

In April, TSB (a retail and commercial bank in the UK) announced they would shutdown some systems for an IT upgrade. However, the upgrade was a disaster, and over a month later customers are still having problems. As a result,...

keys authentication

How risk-based authentication has become an essential security tool

A new generation of risk-based authentication (RBA) products can improve both customer experience and security. Here's what to look for in them.

01 day breach calendar year

One year later: security debt makes me WannaCry

WannaCry rocked the world one year ago, but there are still lessons for us to unpack about the debt we still have to pay to be secure.

Apple phishing webpage

Salted Hash - SC 01: What an Apple phishing attack looks like

Today on Salted Hash, we’re going to look at a phishing attack from two sides. The first side will be what the victim sees. After that, we're going to see what the criminal sees. We'll also discuss some steps administrators can take...

Load More
You Might Also Like