Authentication

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Experience an RDP attack? It’s your fault, not Microsoft’s

Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.

Partner Content
How to Secure Your Sensitive Data in the Cloud

While most Cloud Service Providers (CSPs) have already deployed strong front line defense systems like firewalls, anti-virus, anti-malware, intrusion detection, etc. to thwart malicious attacks, sophisticated hackers are breaching them with surprising ease today.

Kaspersky Cyberinsights 2018: Cybersecurity in the age of digital transformation

The Kaspersky Cyberinsights 2018 two city series in India, as part of its pan-APAC series, put the spotlight on the central theme of “Building Cyber Defence and Resilience with Adaptive Security Framework”. 

31 percent of Indian organisations expect to be victims of cyber-attacks: Survey

With the rise in cybercrime in India, we need to collaborate to stay protected from cyberthreats and increase our resilience over a period of time. 

Cisco sets USD 2.3B deal for unified access, multi-factor authentication security firm Duo

Cisco closes on its $2.35 billion deal with network identity, authentication security firm Duo. The deal will help customers securely connect any user to any application on any network.

Partner Content
Digital Signatures: Making e-Procurements Safer

As technology evolves, so do hackers. Armed with a deviously brilliant mind and superior knowledge of the latest technologies, today’s hackers are breaching organisations’ cybersecurity with surprising ease. 

Cisco unearths 13 'High Impact' IOS vulnerabilities you need to patch now

Cisco has exposed 13 vulnerabilities in its IOS and IOS XE switch and router operating software that the company said should be patched as soon as possible. The vulnerabilities were detailed in Cisco’s twice-yearly dump of IOS exposures and all have a High Impact security rating and should be evaluated by users as soon as possible.

Hey Facebook: Quit discouraging people from using 2FA

Facebook is spying on user 2FA phone numbers to target them with ads. A non-trivial percentage of Facebook users will not use two-factor authentication as a result, a net loss to security.

Partner Content
Top 5 IT tips for remote and mobile teams

In 2015, a vulnerability was detected in WiFi routers in hotel allowing attackers to distribute malware and monitor and record data sent over the network. A laptop is stolen every 53 seconds in the United States. 

Partner Content
4 Ways to Breach-proof Your Bank’s ATMs

‘ATM Cash-out’ is a meticulously planned, highly choreographed, global cyber attack wherein hackers breach a bank or payment card processor’s cybersecurity systems and use cloned debit cards at multiple ATM machines around the world to fraudulently withdraw millions of dollars within a short period of time. 

Google Chrome's new password manager makes securing Chrome even more important

Google's Chrome 69 includes a nifty new password manager that promises to make third-party password managers unnecessary by both generating and storing site passwords. But that makes securing Google's main password even more important.