A group of boffins from Carnegie Mellon University is proposing that inkblot-style patterns form the basis of a system to replace CAPTHCAs, and is offering an open challenge to see how well it works.
Browsing: Identity and Access Management (IAM)
There is a perception by many organisations that their internal network is a relatively safe haven from attackers.
When considering cloud the inevitable security questions arise around where are your data centers, what happens to my data and how can I ensure the decision I am making does not expose us to risk.
Riskive, the Social Risk Management company, today unveiled FriendGuard, a free app that leverages advanced math and science to protect individuals and families against social identity theft and malware attacking their social accounts.
Security flaws in Google Chrome could enable attackers to capture personal data stored in the browser’s history files, researchers said Friday.
A group of embedded device hackers has turned up a vulnerability in D-Link consumer-level devices that provides unauthenticated access to the units’ admin interfaces.
Edward Snowden got a job with top-level clearance at National Security Agency contractor after he had been dismissed by a previous employer — the CIA — on suspicion of breaking into computers without authorized access.
BCS & Computing UK IT Industry Awards 2013 recognise unique USB drive with PIN code access datAshur in the category for ‘technology excellence’
Security is a major concern as BYOD increases. We’re all familiar with the problems arising from data stored on unsecured devices which then go missing, but what about unsecured network access?
As the desire for business agility increases, companies are bypassing security teams and processes to set up risky IT infrastructures in the cloud