Top

Category: Access control


Access control, Application security

OpenSSL alpha adds TLS 1.3 support in the alpha version of OpenSSL 1.1.1

February 16, 2018

Via: Security Affairs

OpenSSL adds TLS 1.3 (Transport Layer Security) supports in the alpha version of OpenSSL 1.1.1 that was announced this week. OpenSSL adds TLS 1.3 supports in the alpha version of OpenSSL 1.1.1 that was announced this week. TLS protocol was […]


Access control, Application security

Scary apps on Google Play, and what to do about them

February 14, 2018

Via: Kaspersky Blog

Jane, the mother of seven-year-old Samantha, was in the next room when she heard a horrible voice coming from the smartphone her daughter was playing with. She came running into the room as the voice continued: “You look afraid, is […]


Access control, Security

The end of Net Neutrality: the sky is not falling

January 5, 2018

Via: CIO

There was much ado in the media and political world recently about the Federal Communications Commission’s 3-2 vote to end the Obama administration’s two-year-old policy of “Net Neutrality” – that Internet service providers must enable access to all content and […]


Access control, Security

Behavioral biometrics will replace passwords by 2022

January 4, 2018

Via: Hot for Security

In just a few years, we can all safely forget those cumbersome passwords we use to secure and unlock our devices. And we will be able to thank on-device artificial intelligence (AI) for easing the strain on our memory, according […]


Access control, Network security, Vulnerabilities

Advanced Deception: How It Works & Why Attackers Hate It

December 19, 2017

Via: Dark Reading

While cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats. Distributed deception platforms have grown well beyond basic honeypot trapping techniques and are designed for high-interaction deceptions, early detection, and analysis of […]


Access control, Cyber-crime, Network security

Let no endpoint go dark

December 18, 2017

Via: Help Net Security

The compromise of a single enterprise endpoint can ultimately lead to a wider security incident, ransomware outbreak, data breach, costly remediation and rebuilding of lost reputation. Most organizations know this, but still struggle to obtain visibility into and control over […]


Access control, Hacker, Virus & Malware

Leaky Windows 10 password manager allows hackers to steal your data

December 18, 2017

Via: Hot for Security

A noted Google developer has discovered a troubling flaw in a popular password manager that Windows 10 installs by default. Hackers could get their hands on user passwords via clickjacking and/or malicious code-injection techniques. Google Project Zero researcher Tavis Ormandy […]


Access control, Network security, Security

Balancing Enterprise Security and User Access: 6 Points to Keep in Mind

December 15, 2017

Via: CIO

The balancing act that CIOs and CSOs must perform to keep the enterprise secures a delicate one – guarding corporate assets from both internal and external malicious threats, while also giving all users secure access to data, anytime, anywhere, from any device.What’s more, […]


Access control

Who Am I? Best Practices for Next-Gen Authentication

November 16, 2017

Via: Dark Reading

By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords. There is no ignoring it: our financial security is compromised daily. Many security professionals reading this wouldn’t hesitate to recount all […]


Access control, Mobile

Apple’s Face ID can be quickly disabled in an emergency

September 18, 2017

Via: Help Net Security

A week ago, Apple debuted iPhone X and Face ID, a new biometric security mechanism that replaces Touch ID. Face ID allows users to unlock their iPhone with their face. The same mechanism can also be used to make purchases […]