Read more about authentication
Bookmark and Share
  • PoS vendor confirms Jimmy Johnís breach was their fault

    29.09.2014

    Signature Systems, the PoS system vendor that has been named as the likely point of origin of the Jimmy Johnís payment data breach, has confirmed that the attacker(s) gained access to a user name and password the company used to remotely access POS systems.

  • Payment card info of 880k Viator customers compromised

    22.09.2014

    Payment card and personal information of approximately 1.4 million Viator.com customers may have been compromised in a breach that was confirmed late last Friday.

  • How to keep your contactless payments secure

    19.09.2014

    Contactless payments actually have the same level of protection as chip and PIN payment cards, but donít require the user to enter a PIN number.

  • Apple adds two-step verification for iCloud

    17.09.2014

    Apple has announced that the two-step verification option for iCloud accounts now also extends to iCloud backups, preventing attackers who know the target's password from installing the target's backup on a new device and, thusly, from accessing the information contained in it.

  • Massive Gmail credential leak is not result of a breach

    11.09.2014

    By now, you might have heard that there has been a leak of a nearly 5 million username and password combinations associated with Google accounts.




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Nov 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //