The IT staff can play a crucial role in transitioning today’s workers away from old-school passwords to modern day passphrases.
Browsing: Hacking
Greg Mancusi-Ungaro offers three tips that corporations should take to minimize their customer’s exposure to phishing attacks following a breach.
As businesses gain more experience with the threats associated with BYOD, they’re hard-pressed to find solutions that deal with them.
Norman Rohde, Vice President, Sales, EMEA, Novell, looks at how a data breach doesn’t always have to have a negative outcome.
Birmingham City University hosted Young Rewired State’s (YRS) Festival of Code back in July of 2014, which encourages young coders to hone their skills.
Reports of the CyberVor attack has shocked many readers, but what surprised us was that the number of hacked sites seemed low for an attack of this scale.
Google security researcher Michele Spagnuolo has developed a proof-of-concept tool called Rosetta Flash that reveals security problems with Adobe Flash.
Proofpoint recently detected a Bitcoin credential phishing campaign that received a 2.7% click rate.
Safelight Security offers a look at a few techniques most commonly used among attackers to steal people’s passwords.
Intercede has found that consumers are leaving back doors open to hackers when they sign up for automatic login on mobile apps or when they share PIN codes.