The new tools enable mobile-based options for employees to sign into corporate applications or create self-sovereign identities, access to which they control.
Antivirus makers Sophos and Avast are warning users that installing a recent Windows update may cause their PCs to lock up or fail to boot.
Around late Friday evening, Microsoft announced a data breach that resulted from a Microsoft technical support agent’s credentials being compromised.
Apple’s 2FA iCloud system is generally very diligent about securing your account, especially when you have two devices, but it has one key flaw.
When you forget your Gmail password, and have two factor authentication (2FA) enabled, Google will SMS or call you with a six to eight digit code. You enter the code (Google calls this 2-step verification) and gain access to your account.
VPN packages from Cisco, Palo Alto, F5 and Pusle may improperly secure tokens and cookies, allowing nefarious actors an opening to invade and take control over an end user’s system.
Researchers have uncovered an invitation-only Tor-concealed marketplace where stolen credit card details are bundled with the victim's device fingerprint, meaning criminal buyers can use them to beat numerous fraud detection systems.
New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.
Google has implemented a new method of two-factor authentication, using an Android phone as a stand-in for a hardware dongle.
Japanese automaker, Toyota, announced on Saturday that a data breach resulted in the data of 3.1 million customers being compromised. This is in fact the second data breach the company faced in the last five weeks.
The key to better security lies in adopting a differentiated human-centric approach to cybersecurity, where people—rather than IT infrastructure—become the new perimeter.