Since the early days of computing, passwords have long been used as a method of identity authentication. However, there is…
Browsing: Identity and access management (IAM)
Google has published a new blog post in response to news earlier this week that detailed how common it is for…
The BBC reported earlier this afternoon that Google has confirmed that private emails sent and received by Gmail users can sometimes be read…
The team behind the Trezor multi-cryptocurrency wallet service has discovered a phishing attack against some of its users that took place over…
A recent report from Appthority demonstrates that information belonging to millions of users has been leaked via apps with misconfigured Firebase databases.…
The Diameter protocol used with today’s 4G (LTE) telephony and data transfer standard is vulnerable to the same types of…
Cybercriminals looking to make a profit are turning their attention towards an industry known for housing sensitive consumer data with…
NHS is set to launch its own mobile app to put patients in touch directly with GPs. The app will…
Technology industry executives commented this morning as part of our security experts comments series on the California Consumer Privacy Act of…
The General Data Protection Regulation (GDPR) is finally in force, and the entire cyber security community has had to familiarise…