Ninety per cent of passwords are vulnerable to hacking because even supposedly secure passwords typically share common characteristics. Because people are required to generate so many passwords with particular characteristics - at least ...
Tags: Computer Products, hacking
The Mega file-sharing service has launched a vulnerability reward program that will pay up to 10,000 euros (around $13,600) for every serious security flaw found in the platform and reported responsibly. The rules of the program were laid ...
Tags: Mega, file-sharing service, vulnerability reward program
Google thinks it might have found an answer to the vexing problem of forgotten or weak passwords: "physical" passwords, which might come in the form of a piece of jewelry such as a ring. In a research paper, two of its engineers write ...
Tags: Google, passwords, hijacking, online accounts
CIO-Regardless of the security expertise and resources you apply to securing your assets,you are unlikely to achieve much unless you focus on the most vulnerable element of your organization:your employees. "Computers have become much ...
Tags: secure data, the human element
The online accounts of Virgin Mobile USA subscribers are vulnerable to brute force attacks because the company forces customers to use weak passwords on its website, according to a software developer. "Virgin Mobile forces you to use your ...
Tags: Virgin Mobile, USA subscribers, force attacks, weak passwords
CSO-It was almost a year ago that a curious mathematician with no real Internet security training was able to walk through a gaping security hole left by Google--a weak email cryptographic key. But most security experts say that while the ...
Tags: Google, Email Security, Catastrophe, Internet security
Security experts believe passwords offer little or no protection from unauthorised access to corporate IT systems and online accounts, and now Intel is working on an alternative. An increasing number of data breaches are being blamed on ...
Tags: Intel, unauthorised access, IT systems, online accounts
Security experts say the breach that led to the publication of the login details of more than 453,000 Yahoo and other companies'customers,highlights common enterprise security failings. The hacking group,known as D33Ds Company,said they ...
Tags: Security, Yahoo Voices, Hacking Group, Application
Developer of security and PC usability solutions [Lamantine Software] announces the release of Sticky Password 6.0, the newest version of the well-known password manager and form filler. CZECH REPUBLIC, June 13, 2012 /24-7PressRelease/ ...
Tags: Lamantine Software, password manager solutions, Sticky Password software