The future might replace passwords with mobile authentication. Recently the World Wide Web Consortium (W3C) announced on 17 February this year that it launched a new standards effort in view of a different web authentication method – “a more secure and flexible alternative to password-based log-
We come into contact with numerous digital files every day, but some of them might not be what they seem at first glance; designated by the term “steganography”, the practice of concealing a message in a different cover-message precedes the era of cybernetics. A sub-section of cryptography, ste
Part of data privacy protection consists in being able to permanently delete data when necessary. Data deletion is another form of user control over sensitive or private information that has been at one moment entrusted upon a device or a storage medium. This brings out the question of how hard it
Visual hacking, also dubbed shoulder surfing , is the act of accessing sensitive or relevant data by taking advantage of a physical position that allows the intruder to visualize another person’s device screen. Variations consist in determining the password from the most worn out keyboard key or t
This year has seen some major cyber-security breach cases that brought to the general attention the fact that nobody is generically safe. From private companies to government agencies, cyber-attacks threaten all entities that handle sensitive data. Taking into consideration the cyber-data black
The encryption debate reads the following way: while the logic of cyber-security and its encryption tools forecasts an impenetrable encryption, the government is worried that such an efficient cyber feature would block the law enforcers. Although creating a relative paradox, the diverging opinions
The EMV card comes with enhanced security features, but also with particular vulnerabilities. Since this type of credit cards has been utilized for a while in Europe and in other regions of the globe, the cyber-attackers have already developed various methods of bypassing the security features in
The OPM data breach the U.S. government announced on June 4th qualifies as a 15 on a scale from one to 10, by the loss of credit card numbers and names. Initial estimate approximated 4.2 million affected people, a number later changed to 18 million. Recently the number of affected people increased
ITCurated uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our Cookie Policy