Access control and authentication - News, Features, and Slideshows
- Google extends two-factor authentication with physical USB keys
- Researchers bypass the restrictions of Mac OS X default sandbox profiles
Google is letting users protect their accounts against password compromises by adding support for two-factor authentication based on physical USB keys.
By Lucian Constantin | 22 October, 2014 06:40
Hackers claim to have stolen a database of almost 7 million Dropbox log-in credentials, but the company says its service was not hacked and that unrelated websites are the data source.
By Lucian Constantin | 15 October, 2014 02:07
Many security experts feel that passwords are no longer sufficient to keep online accounts safe from hackers, but we're still a long way from widespread adoption of biometrics and alternative methods of authentication.
By Lucian Constantin | 14 October, 2014 07:29
Hackers could have had an inside track on unpatched flaws in major software projects because of a critical vulnerability in Bugzilla, a system that many developers use to track and discuss bugs in their code.
By Lucian Constantin | 07 October, 2014 23:52
Developers being overly trusting is one of them.
By Kenneth van Wyk | 21 May, 2013 20:56
An assessment of the information security department shows that it has a lot of growing up to do yet.
By Mathias Thurman | 05 November, 2012 11:15
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
- FTAccount Manager - DataNSW
- FTSEM Specialist - SEM AnalystNSW
- FTCampaign Managers | Programmatic / RTB | Display + Video | Trading desk |SydneyNSW
- FTDigital Marketing CoordinatorNSW
- FTClient Service Director - Search: SEO & PPCNSW
- FTData Product SpecialistNSW
- FTStrategic Account Manager - Google AnalyticsNSW
- FTDigital Performance Manager - MediaNSW
This paper discusses: • The growing challenge of maintaining information security in today’s evolving enterprise environment • Key advantages of desktop virtualization as an inherently more secure computing architecture • The top ten benefits of using desktop virtualization to strengthen information security • And how you can regain control and reduce risk without sacrificing business productivity and growth
- At Austin airport, Wi-Fi predicts how long the security line will be
- Twitter weaves Fabric, but will developers be drawn in?
- AT&T signed up 500,000 cars for its 4G network last quarter
- Debian community splits over systemd, but fork still unlikely
- TIO task force to field NBN grievances
- Government regulation on cloud security may spur SaaS use in health care
- Progress builds up developer chops with Telerik buy
- Monumental day for Wikipedia in Poland
- Microsoft misses Windows bug, hackers slip past patch
- IBM's chip business sale gets national security scrutiny
- IBM and Microsoft pledge to make their Clouds compatible
- Some Bank of America customers double-charged with Apple Pay
- Google to build Play-like hardware store for Project Ara
- Chicago takes top spot in mobile performance ranking
- Accused text-message spammers to pay $9 million in settlement