Networking giant Fortinet warns that more products than it initially suspected have a hardcoded password that attackers could abuse to remotely gain backdoor access to vulnerable devices. But why did the flaws take so long to be found?
Security experts are warning that Chinese networking product manufacturer TP-Link has been shipping routers with a WiFi password that's based on their MAC address, thus making their passwords easy for would-be attackers to sniff.
The PCI DSS was developed to "encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally. PCI DSS provides a baseline of technical and operational requirements designed to protect cardholder data." Even by following the PCI DSS guidelines, it is...
Every company, regardless of size, has confidential information that needs to be protected. With data breach incidents happening on an almost weekly basis, organizations must take the necessary precautions to ensure their data is secure. But how many organizations are truly making efforts to keep their data...
Despite the frequency of healthcare data breaches, only half of U.S. hospitals have the infrastructure to support two-factor authentication, according to a new report. Plus, some information security leaders say implementation of the technology at many of those facilities is likely relatively narrow.
Has authentication become too complex for
banking institutions? That's a legitimate concern, says Peter Tapling of Early Warning.
The key, he says, is to leverage new strategies and solutions to unify and simplify
Download this eBook to explore new authentication strategies and:
Dell's announcement that it plans to purchase storage maker EMC for a mind-boggling $67 billion does not make clear the fate of EMC's information security unit, RSA. Analysts believe Dell has not yet determined whether RSA fits into its long-term plans or should be sold or spun off.
Defeating biometrics-based security with far-fetched schemes, such as stealing or replacing eyeballs and fingertips, is a recurring theme in the movies. But real-world advances in authentication will help make it difficult to circumvent real-world security.
For contact centers, the value and viability of security questions may be ending. Professional fraudsters can successfully answer questions using stolen customer records from growing cyberbreaches; Customers in the online age are unhappy spending the extra 45 seconds. Security questions frustrate customers more than...
The severity of the U.S. Office of Personnel Management breach continues to grow, with investigators now reporting that hackers stolen 5.6 million people's fingerprint data. The theft may have security implications well into the future.
For years, information security experts have been warning users to create complex, unique passwords, and organizations to secure them properly. But an analysis of 12 million cracked Ashley Madison passwords shows how much we're still failing.
Year after year, cyber threats continue to increase in both sophistication and
frequency. Many of the attacks involve compromised user names and passwords.
In an environment where identity theft, data breaches
and fraud are increasing, as anywhere, anytime access for
employees, partners and customers is also...