Tech columnist Christopher Mims wrote a piece about two-factor authentication and how awesome it is. The idea of a code being sent to your phone to log you into a site — rather than relying just on a password that can be guessed or stolen — is so awesome that he thinks it’ll make the password completely irrelevant.
To show how awesome two-factor is, he decided to just give up his Twitter password to anyone who wants it. He thinks that the password is finally dying, if we want it to. Ironically, you need a WSJ password to read the piece. But his handing out his password happens in the first paragraph which all can read, and it was, quite honestly, the only novel part of the piece.Read more
Physically, Adelson and Sands are well protected. He appears in public with a phalanx of armed bodyguards, said to be former agents of the U.S. Secret Service and Mossad, Israel’s intelligence agency.
Sands paid almost $3.3 million to protect Adelson and his family last year, according to a company filing. That’s on top of what Sands spends on vaults, security cameras, biometric screening devices, and one of the largest private police forces of any U.S. company, all to safeguard the millions of dollars of cash and chips that flow through its operations every day. But the company has been slow to adapt to digital threats.Read more
It was written about the dangers that public Wi-Fi hotspots pose to users time and time again, but today let's talk about threats that come specifically from home wireless networks. Many wireless router users do not consider them to be threatening, but we are here to shed some light on this unfortunate reality.
This guide is by no means complete, but several of these great tips can help you improve your home network security. One of the most serious mistakes often made is using the default, out-of-box, admin password. Combined with some non-critical remote vulnerability or an open wireless connection, this might give criminals full control over the router.Read more
The danger of not changing the default passwords on digital equipment is finally hitting home, after a hacker published the video streams of webcams onto the internet. Anyone who had purchased an online webcam with remote viewing capabilities was at risk.
The hacker from Russia decided to take action to expose the cameras. He programmed a script to search the world for any webcams connected to the internet, and then gained access to them by using a default password set by the manufacturers. This password is publicly available, so anyone could have been accessing these cameras at any time without the owners knowing.Read more
A new tool called Password Changer is designed to change multiple passwords for different websites all at once – especially useful in light of Heartbleed and other security threats.
A new product from Dashlane could take much of the hassle out of changing your major website passwords, which could be particularly handy in the event of a security breach. Cyberattacks and hacks against major websites seem to have turned into a daily occurrence, often leaving user log-in credentials exposed. And people who use the same password at all or most of the sites they visit can be particularly vulnerable.Read more
The Trojan has once again branched out beyond its roots as banking malware and is now targeting the master passwords guarding major password management products. A new configuration file found on an infected computer targeting processes used by the respective password management tools.
Citadel, like most widely distributed malware families, is crossing over more and more from the realm of cybercrime to APT-style targeted attacks. New features and a hunger for legitimate credentials make the malware, which is already sitting on hundreds of thousands of machines, particularly dangerous to critical infrastructure, in addition to financial services.Read more
A brute force attack is, simply, an attack on a username, password, etc. that systematically checks all possible combinations until the correct one is found. Scripts are usually used in these attacks to automate the process of arriving at the correct username/password combination.
This is why time is of the essence when it comes to detecting and stopping a brute force attack – the more time the attacker has, the more passwords can be tried. Brute force attacks are one of the few hacks detectable by their volume, rather than their type. As an IT professional - do you know what a brute force attack is, how to spot one when it happens, and how to prevent it?Read more
Despite the fact that a lot of ways of authentication and access control were invented in the world, only password is the most common and the most vulnerable as well. Many internet portals and services forbid users to create simple passwords for their safety.
On the one hand it a good idea, but on the other hand it is uncomfortable. If we multiply this fact to a dozen of such sites, we will have a real headache. To eliminate the problem between the human factor and data security the aid of password managers is needed, they take on the organization of users' passwords. However, it turns out that the safety of the user depends on a Master Password only.Read more
110 Reykjavik, Iceland