Read more about authentication
Bookmark and Share
  • Password security is not just a user problem

    30.09.2014

    A lot has been said about multi-factor authentication, and it can add quite a bit of security to a system.

  • PoS vendor confirms Jimmy Johnís breach was their fault

    29.09.2014

    Signature Systems, the PoS system vendor that has been named as the likely point of origin of the Jimmy Johnís payment data breach, has confirmed that the attacker(s) gained access to a user name and password the company used to remotely access POS systems.

  • Payment card info of 880k Viator customers compromised

    22.09.2014

    Payment card and personal information of approximately 1.4 million Viator.com customers may have been compromised in a breach that was confirmed late last Friday.

  • How to keep your contactless payments secure

    19.09.2014

    Contactless payments actually have the same level of protection as chip and PIN payment cards, but donít require the user to enter a PIN number.

  • Apple adds two-step verification for iCloud

    17.09.2014

    Apple has announced that the two-step verification option for iCloud accounts now also extends to iCloud backups, preventing attackers who know the target's password from installing the target's backup on a new device and, thusly, from accessing the information contained in it.




Spotlight

Free security software identifies cloud vulnerabilities

Posted on 21 October 2104.  |  Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //