Authentication

'Collection #1' reveals 773 million email addresses, passwords in one of largest data breaches ever

Over 1,160,253,228 combinations of email addresses and passwords have been published online in one of the largest data breaches ever. Check to see if your data has been slurped up.

What is a CISO? Responsibilities and requirements for this vital leadership role

The chief information security officer (CISO) is the executive responsible for an organization's information and data security. Learn what it takes to land a CISO job and how to be successful in the role.

Authentication, encryption and AI – the key components in securing connected cars

The single biggest threat to widespread proliferation of connected cars is data security. A conversation with two giants in the Indian auto space – Tata Elxsi and Tata Technologies brings to light why the threat is of paramount importance and what can be done to bolster security.

Four regulatory changes that rocked enterprise tech in 2018

Here are four major regulatory changes of the year that made regulatory technology (RegTech) rise in prominence in 2018. 

Biggest cybersecurity breaches in 2018 that rocked the Indian threat landscape

Here is a list of the top cybersecurity breaches that affected India in 2018.

Cybersecurity trends that 2019 might hold for us

With the cyber security industrial complex in full swing and good business for all the major players, from governments and state sponsored groups, to criminal attackers and the vendors as well as their shareholders, we wonder what horrors this dystopian hell world will spew forth next.

Experian exec says biometrics won’t save you from mobile hacks

Experian's annual data breach forecast predicts that biometric hacking will continue to surge as more mobile devices use fingerprint scans and Face ID technology to protect corporate and consumer data. But there are ways to avoid being hacked.

Indian bounty hunter exposes bug that made 400M Microsoft accounts easily hackable

A Kerala-based bug bounty hunter, Sahad NK discovered a critical vulnerability in Microsoft’s login that made it possible to hack into anyone’s MS Office and Outlook account.

Fortinet secures the global network of DTDC Express

To better defend against sophisticated cyber threats seen in recent years and provide identity-based access to applications, DTDC Express decided to upgrade its existing firewall implementation.

Using a password manager: 7 pros and cons

This veteran security pro feels more secure now that he's using a password manager, but there are still risks.

Quora data breach FAQ: What 100 million hacked users need to know

Hackers have stolen information about 100 million Quora users. Here's what they took and what you need to do next.

New Android denial of service vulnerability found: K7 Computing

Attackers can exploit the Android Debug Bridge (ADB) to modify the phone's authentication PIN or pattern to lock users out of their phones.