Several password replacement schemes have been suggested that use a visual code to log in.
Using a Raspberry Pi nanocomputer and the multiOTP open source library, André Liechti showcases how to how to create an OATH-compliant authentication server at PasswordsCon Bergen 2013.
Bcrypt is a password hashing scheme based on the Blowfish block cipher.
Specific embedded devices are targeted by criminals in order to gain access or utilize for further attacks.
When Apple announced iOS 7, iCloud Keychain was one of its key features.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.