Authentication using visual codes: what can go wrong
Posted on 18 December 2013.
Several password replacement schemes have been suggested that use a visual code to log in. However the visual code can often be relayed, which opens up a major vulnerability. Can anything be done, and what compromises need to be made to protect users?
Learn more in this PasswordsCon Bergen 2013 presentation by Chris Warrington, Pico project, University of Cambridge.
Posted on 27 August 2014. | Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.
Posted on 26 August 2014. | Stuart McClure, CEO at Cylance, talks about how the information security industry has evolved when it comes to detecting bad guys, but it's being mostly reactive and not proactive.
Posted on 25 August 2014. | The Center for the Study of the Presidency & Congress (CSPC) launched a project to bring together representatives from the Executive Branch, Congress, and the private sector to discuss how to better secure the U.S. electric grid.
Posted on 25 August 2014. | The importance of information security and technology risk management continues to grow, but many risk and security professionals continue to struggle with non-IT executive communication.