Top

Category: Access control


Access control, Security

Many of us are still using work passwords for personal use

February 24, 2021

Via: TechRadar

Many employees admit to using their work passwords for signing into consumer websites, new research has claimed. The 2021 Secure Consumer Cyber Report by automation platform Ivanti found that one in four admitted using an official work email or password […]


Access control, Security

3.27 Billion Reasons to Change Your Password

February 18, 2021

Via: Panda Security

The largest-ever compilation of stolen passwords and emails was recently posted online on a hacking forum that anyone could access. The lists contain a staggering 3.27 billion entries! The enormous database appears to be a compilation of leaked login credentials […]


Access control, Security

Poor Password Security Led to Recent Water Treatment Facility Hack

February 11, 2021

Via: The Hacker News

New details have emerged about the remote computer intrusion at a Florida water treatment facility last Friday, highlighting a lack of adequate security measures needed to bulletproof critical infrastructure environments. The breach, which occurred last Friday, involved an unsuccessful attempt […]


Access control, Security

5 Ways Companies Can Protect Personally Identifiable Information

February 5, 2021

Via: Security Intelligence

Protecting personally identifiable information (PII) is one of the key aspects of a security expert’s job. What does personally identifiable information include? Social Security numbers, birth dates and places, financial accounts and more can give threat actors a foothold to […]


Access control, Cyber-crime, Phishing, Security

Passwords stolen via phishing campaign available through Google search

January 21, 2021

Via: Security Affairs

Check Point Research along with experts from cybersecurity firm Otorio shared details on their investigation into a large-scale phishing campaign that targeted thousands of global organizations. The campaign has been active since August, the attackers used emails that masqueraded as […]


Access control, Security

Hashing explained: Why it’s your best bet to protect stored passwords

January 13, 2021

Via: CSO Online

What is hashing? Hashing is a cryptographic process that can be used to validate the authenticity and integrity of various types of input. It is widely used in authentication systems to avoid storing plaintext passwords in databases, but is also […]


Access control, Security

Researchers Show Google’s Titan Security Keys Can Be Cloned

January 11, 2021

Via: Security Week

Security key devices are considered highly efficient when it comes to protecting accounts against takeover attempts and, unlike other types of two-factor authentication (2FA) systems, they are much more difficult to compromise. They are recommended for securing very important accounts […]


Access control, Security

How Organizations Can Prevent Users from Using Breached Passwords

December 4, 2020

Via: The Hacker News

There is no question that attackers are going after your sensitive account data. Passwords have long been a target of those looking to compromise your environment. Why would an attacker take the long, complicated way if they have the keys […]


Access control, Security, Threats & Malware, Vulnerabilities

Hackers Stealing and Selling VoIP Access

November 9, 2020

Via: DataBreach Today

Check Point Research has uncovered a large and likely profitable business model that involves hackers attacking and gaining control of certain VoIP services, which enables them to make phone calls through a company’s compromised system. During the first half of […]


Access control, Security

How to Protect Yourself From Pwned and Password Reuse Attacks

November 2, 2020

Via: The Hacker News

Many businesses are currently looking at how to bolster security across their organization as the pandemic and remote work situation continues to progress towards the end of the year. As organizations continue to implement security measures to protect business-critical data, […]