Advertisement
Top

Tag: identity


Mobile security, Vulnerabilities, Wireless security

MAC Randomization Flaws Expose Phones to Tracking

March 13, 2017

Via: Security Week

Researchers have disclosed a new attack method that can be leveraged to track mobile devices that rely on Media Access Control (MAC) address randomization to protect users’ privacy. A MAC address is a unique identifier assigned to a device’s network […]


Access control

Google reCaptcha Bypass Technique Uses Google’s Own Tools

March 3, 2017

Via: Threat Post

A proof of concept bypass of Google’s reCaptcha V2 verification system, posted online Tuesday, uses Google’s own web-based tools to pull off the skirting of the system. The tool dubbed ReBreakCaptcha “lets you easily bypass Google’s reCaptcha v2 anywhere on […]


Identity theft

The future of Identity Management: Passwords and the cloud

June 1, 2016

Via: Help Net Security

Compromised credentials are still the cause of almost a quarter of all data breaches, according to the Cloud Security Alliance. With a surge in cybercrime, it’s no wonder that the global identity and access management (IAM) market is expected to […]


Network security

Who’s tracking you on the Web?

May 11, 2016

Via: Kaspersky Blog

Social networks, online news outlets, media service providers, online shops — all of them offer high quality content, compared to the Internet of the past. To get to this quality, a large investment is required. Like all investments, there is […]


Access control

What to Look for When It Comes to Identity and Access Governance

April 18, 2016

Via: Security Intelligence

It isn’t easy to get a clear overview of what happens in your organization when it comes to identity and access governance (IAG). To cover the basics first and build up from there, it is important to understand that identity […]


Cyber warfare, Identity theft

Evading cyber legislation: Jurisprudence cloaking is the future of cyber warfare

November 9, 2015

Via: Help Net Security

Now hackers have come up with virtual ways to be transparent – at least to the law: cyber cloaks. Cyber cloaks are most powerful for those engaged in criminal cyber activity, as it offers the freedom from consequence of persecution. […]


Privacy protection

Google forges ahead with data encryption despite FBI warnings

September 16, 2015

Via: privacy-protection

#google on Wednesday vowed to charge ahead with more encryption of #user data even as law enforcement officials warn the technology could hamper their investigations. The tech giant’s director of law enforcement and information security, Richard Salgado, on Wednesday told […]


Editorial, Privacy protection, Security

Keystroke profiling

September 16, 2015

Via: Russel Edwards

Also known as keystroke or typing dynamics, keystroke profiling translates into associating an individual with his/hers way of interacting with an interface via a keyboard or another device of input. This identification method can serve for authentication (it belongs to […]


Data loss

Four advantages of an identity behavior-based approach to cybersecurity

March 24, 2015

Via: data-loss

With an ever-increasing number of data breaches, more money is being poured into IT security budgets. According to Gartner, the average global security budget increased 8 percent from 2013 to 2014 and will grow another 8 percent in 2015. Additionally, […]