Twitch, the game streaming website, has been hacked and users’ details have been compromised. Users’ accounts have been reset and it does not seem that any credit card or other financial information has been made available.
Passwords do appear to have been leaked and the company recommends that users reset their details on any site where they use the same password. It means that Twitch website security became very vulnerable. Users received emails telling them that there may have been unauthorized access to some of your Twitch user account information.
Read moreMicrosoft has announced an ambitious plan to replace passwords with biometric identifiers in it’s yet to be released Windows 10 operating system. The race to replace passwords has been on for years, it offers the most realistic chance of eradicating the archaic.
The difficultly with password alternatives to date has been primarily a problem of adoption and practicality. Tattoos as passwords, for example, is a ridiculous idea. In body chip implants are promising but I imagine many people would be squeamish about having a computer chip injected into their bodies. Windows Ten may put biometric technologies within the reach of all computer users.
Read moreTurns out nobody can remember their Yahoo passwords. Now the company wants to make it so no one has to. Yahoo! launched a new service, which lets someone log into a Yahoo account using a short password the company texts to their phone instead of having to remember their own password.
This is the first step to eliminating passwords. The process feels like a common process for logging into websites called two-factor authentication, where you first enter your own password, then enter a second password the company sends to your phones.
Read moreEarlier we wrote a lot about different skimming techniques, different ways of compromising bank cards, and flaws in new secure credit cards that lets hackers steal money.
Now let’s talk about the less apparent dangers that run the risk of remaining unnoticed by the majority of users. We will relate stories about risks attributed to cross-border payments, as well as some inherent flaws found in payment systems. Many think that indicating a CVV code is necessary for processing any online transaction. However, some online shops provide an opportunity to avoid this step, and do not transmit the secret code to a payment gateway.
Read moreInternet of Things connected security systems are becoming more popular, but may not be as secure as we like to think. Security systems connected to the Internet of things could create an unexpected back door that puts owners at risk.
Specifically, brute-force attacks can be especially helpful in breaking through security, with manufacturers neglecting to use lockout procedures after failed repeated login attempts. In addition, there were security vulnerabilities found in user interfaces on mobile, desktop and cloud platforms utilized by home owners. HP didn't disclose which vendors it used in its IoT security system study.
Read morePresident Obama’s digital security leaves something to be desired. In remarks at a cybersecurity summit at Stanford University, Obama admitted he's used some passwords that are pretty easy for cyber criminals to access.
The glib comment speaks to a deeper vulnerability about many people’s use of passwords, which are often simplistic and unoriginal. Those weak passwords don’t pose much of a challenge to hackers and have made it easier for them to intrude into people’s personal or corporate networks. As more and more information about people’s communications, travels and lives moves online, security experts have pushed for a move toward more secure authentication systems.
Read moreIt is better to think before you let someone borrow your computer. One of the most common risks of allowing someone else access to your desktop is that they can impersonate you, using any app where you’re already signed in.
They could send prank message using your default email client, or profess your undying love for Justin Bieber using your logged-in Twitter account. Of course it’s annoying, but far from fatal. The situation becomes considerably worse if you use Google Chrome to save and synchronize passwords for easy logins at your favourite websites. Initially, the saved password is displayed as a row of asterisks.
Read moreOwners of Internet-connected home security systems may not be the only ones monitoring their homes. A new HP study found that 100 percent of the studied devices used in home security contain significant vulnerabilities, including password security, encryption and authentication issues.
Home security systems, such as video cameras and motion detectors, have gained popularity as they have joined the booming Internet of Things market and have grown in convenience. Manufacturers are quickly bringing to market connected security systems that deliver remote monitoring capabilities.
Read moreExperts disclosed a widespread level of employee indifference towards protecting sensitive corporate data, including personal information of customers. In fact, an alarming number of employees surveyed admitted they would sell their passwords, some for little money.
These statistics are based on a global survey of employees at large organizations. In addition to blatant sabotage, the survey also confirmed that employees are lax about password management in general. Specifically, employees routinely share login information for corporate applications with their colleagues, so it increases the potential that the passwords they sell might not even be their own.
Read moreTesla Motors Inc's electric vehicles can be located and unlocked by criminals remotely simply by cracking a six-character password using traditional hacking techniques, according to newly released research.
A corporate security consultant said that he recently conducted a study of the Tesla Model S sedan and found several design flaws in its security system. He said his review did not uncover any hidden software vulnerabilities in the car's major systems. Tesla car can only be driven when a key fob is present, but it can be unlocked via a command to the car transmitted wirelessly over the Internet. If a password is stolen or cracked, someone could locate and gain access to the car.
Read moreAxarhöfði 14,
110 Reykjavik, Iceland