Read more about authentication
Bookmark and Share
  • The value of Bring Your Own Identity

    29.07.2014

    New research shows that both the lines of business and IT departments see value in Bring Your Own Identity (BYOID) initiatives, where social networking or digital IDs are used for application login.

  • Operation Emmental exploits holes in banking security

    23.07.2014

    Trend Micro researchers have discovered and analyzed a clever attack aimed at customers of Austrian, Swiss, Swedish, and Japanese banks.

  • Interest for SSL and PKI on the rise

    23.07.2014

    The surge in the number of data breaches and recent security bugs such as Heartbleed has generated strong interest in digital certificates and technologies, including SSL and PKI.

  • Selectively re-using bad passwords is not a bad idea, researchers say

    16.07.2014

    For all the repeated advice to use different, complex password for each online account, users are still opting for easy-to-guess, short ones and use them repeatedly across many websites and online services.

  • Critical vulnerabilities in web-based password managers found

    14.07.2014

    A group of researchers from University of California, Berkeley, have analyzed five popular web-based password managers and have discovered - and then responsibly reported - vulnerabilities that could allow attackers to learn a userís credentials for arbitrary websites.




Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //