The Latest in IT Security

1

After entering a password, your regular computer keyboard might appear to look the same as always, but a new approach harvesting thermal energy can illuminate the recently pressed keys, revealing that keyboard-based password entry is even less secure than previously thought. Computer Science Ph.D. students Tyler Kaczmarek and Ercan Ozturk from UC Irvine’s Donald Bren […]

Read more ...

1

Password reuse across multiple sites creates major security risks. If an attacker can steal credentials and gain access to one account, he or she can also log into every other account that uses the same password. The threat doesn’t just apply to individuals, however. Employees using the same passwords at home and work put the […]

Read more ...

1

Sabotaging corporate security initiatives Whether accidental or intentional, an employee’s online activities can make or break a company’s cybersecurity strategy. Take password usage as one example. Employees create passwords they can easily remember, but this usually results in weak security that hackers can bypass with brute force attacks. Similarly, individuals who use the same password […]

Read more ...

1

Aerendir founder Martin Zizi has developed an authentication system that analyses signals sent from the nervous system to the hand

Read more ...

Categories

FRIDAY, SEPTEMBER 21, 2018

Featured

Archives

Latest Comments

Social Networks