Tag "Authentication"

Back to homepage
Software

Cyberwar against NATO: Who are Earworm and APT28?

There is a group of cybercriminals who are really making things difficult for NATO. The group is called Earworm and, over the last few years, it has been doing what

Hardware/Network

Major vulnerabilities found in new Wi-Fi standard

The latest WPA3 WiFi security and authentication standard may be suffering from serious safety flaws of its own.  This is according to a group of researchers – Mathy Vanhoef and Eyal Ronen, who issued

Software

How password-less security benefits helpdesks

IT departments and helpdesk teams are desperately overworked and understaffed, and unfortunately, they continue to get inundated with even more tasks. Helpdesk teams are there for everything from huge system

Hardware/Network

The Size Of The Fingerprint Biometric Sensor: Why Bigger Is Better

Biometric fingerprint technology is no longer a novelty. In fact, today’s banks and card issuers are looking to integrate fingerprint biometric technology into every day payment cards to provide customers

Industry Insights

CIOs admit certificate-related outages routinely impact critical business applications and services

Certificate-related outages harm the reliability and availability of vital network systems and services while also being extremely difficult to diagnose and remediate. Unfortunately, the vast majority of businesses routinely suffer

Software

Employee cybersecurity essentials part 1: Passwords and phishing

Your company may have state-of-the-art monitoring and the latest anti-malware and anti-virus programs, but that doesn’t mean you’re not at risk for a breach, or that – as an employee,

Hardware/Network

Authentication Bypass Vulnerability: What is it and how to stay protected?

Organizations failing to enforce strong access policy and authentication controls could allow an attacker to bypass authentication. Attackers could also bypass the authentication mechanism by stealing the valid session IDs

Software

Farewell To Text Password

We are witnessing a critical turning point in the history of identity assurance – transition from the time-honored seals, autographs and textual passwords towards Expanded Password System. The worst part

Software

How WebAuthn aims to solve the password problem

One of the most pervasive challenges in cybersecurity is the balancing act between protection and usability. Security measures have to prevent malicious actors from accessing essential systems and data but

Mobile

A simple and secure biometric login for Android 7.0+

FIDO Alliance announced that Android is now FIDO2 Certified, bringing simpler, stronger authentication capabilities to over a billion devices that use this platform every day. With this news, any compatible device