October 2, 2019
Via: Help Net SecurityThe popularity of Google’s Password Checkup Chrome extension has spurred the company to build the technology into Google Account’s Password Manager and the Chrome browser. Unlike the Chrome extension, these new implementations won’t just point out unsafe username/password combinations due […]
September 24, 2019
Via: Help Net SecurityMirko Zorz, Help Net Security’s Editor in Chief, recently published an article about the state of passwordless authentication that predicted a long journey before this technology is viable. We would like to share that passwordless multi-factor authentication is a reality […]
September 19, 2019
Via: Security WeekRelatively new and fairly simple, the Amadey botnet is available for hire for cybercriminals. One of the threat groups to have used the botnet is TA505, which leveraged it to distribute the FlawedAmmy RAT and email stealers. The phishing campaign, […]
August 26, 2019
Via: Help Net SecurityPassword managers are one of the most powerful defenses against breaches, which can cause massive damage and be incredibly expensive to mitigate. According to the Ponemon Institutes’ 2019 Password and Authentication Security Behaviors Report, 51% of respondents experienced a phishing […]
July 25, 2019
Via: Security AffairsStock trading service Robinhood admitted to have stored passwords of a number of users in plain text, the company is informing impacted ones via email. “When you set a password for your Robinhood account, we use an industry-standard process that […]
July 23, 2019
Via: CSO OnlineOne of the smartest moves you can make to protect yourself online is to use a password manager. It’s one of the easiest, too. We’ll help you find the best password manager for you. A properly designed password manager is […]
July 8, 2019
Via: Help Net SecurityA recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a company. Most organizations place their focus on defending against and […]
July 2, 2019
Via: Help Net SecurityThe recent FlipBoard breach shines a spotlight again on password security and the need for organizations to be more vigilant. Password storage is a critical area where companies must take steps to ensure they don’t leave themselves and their customer […]
May 30, 2019
Via: Help Net SecurityThe majority of organizations are ill-prepared to protect themselves against privileged access abuse, the leading cyber-attack vector, according to Centrify and Techvangelism. Seventy-nine percent of organizations do not have a mature approach to Privileged Access Management (PAM), yet 93% believe […]
Access control, Cloud security, Security
May 24, 2019
Via: Threat PostKeeping track of user names and passwords sounds easy, but it is not. In a world where protected network resources are accessed by employees on mobile devices, outside contractors, web applications and internet of things (IoT) devices – passwords just […]
Access control, Network security, Security
May 22, 2019
Via: Security AffairsThe news is disconcerting, Google has accidentally stored the passwords of the G Suite users in plain-text for 14 years, this means that every employee in the company was able to access them. According to the tech giant, the incident […]
April 19, 2019
Via: TechRadarFacebook has a long, long record of privacy fails and data scandals, but even by its standards the latest one is a jaw-dropper: the platform has revealed up to 1.5 million Facebook users might have had their email contacts unknowingly […]
March 15, 2019
Via: Threat PostCisco Systems is warning customers that a discovery tool for network devices can be accessed by a remote and unauthenticated attacker. The flaw could allow an adversary to log into the system and collect sensitive data tied to host operating […]
Access control, Network security
March 13, 2019
Via: Dark ReadingThe recent cyberattack on enterprise technology provider Citrix Systems using a technique known as password spraying highlights a major problem that passwords pose for companies: Users who select weak passwords or reuse their login credentials on different sites expose their […]
February 27, 2019
Via: CSO OnlineSecurity researchers have recently found flaws in several popular password managers that can allow attackers with access to a computer to retrieve passwords from its memory. While the vulnerabilities are real, protecting secrets in memory is an ongoing issue for […]
Access control, Network security
February 22, 2019
Via: Hot for SecurityRegular internet users today juggle numerous accounts on various platforms and websites, often using the same weak password for all of them. Tech-literate users employ different passwords for different accounts, and strong ones at that. Those who are truly conscientious […]
Access control, Network security
February 21, 2019
Via: Security IntelligenceCreating a seamless, secure experience for your legitimate users is a challenge. Most users are good and deserve a frictionless experience, but the less than 0.1 percent of users that are suspected to be rogue actors, according to IBM Trusteer, […]
February 19, 2019
Via: Hot for SecurityCoinmama, a site that is supposed to “make it fast, safe and fun” to buy Bitcoins and Etherium with a credit card, has suffered a data breach that has resulted in almost half a million customers having their personal details […]
January 29, 2019
Via: Help Net SecurityYubico announced the results of the company’s 2019 State of Password and Authentication Security Behaviors Report, conducted by the Ponemon Institute, who surveyed 1,761 IT and IT security practitioners in the United States, United Kingdom, Germany and France. Understanding behavior […]
Email security, Hacker, Privacy protection
January 17, 2019
Via: Help Net SecuritySomeone has compiled a massive collection of email addresses and plain text passwords, apparently from 2000+ hacked databases, and has made the trove freely available for download via the MEGA cloud storage service. The set – dubbed Collection #1 – […]