Access control and authentication - News, Features, and Slideshows
Attackers have started using the Citadel Trojan program to steal master passwords for password management applications and other authentication programs.
By Lucian Constantin | 21 November, 2014 04:35
"Where's Andrea?" That was the question on the lips of attendees at this week's No Such Con security conference.
By Peter Sayer | 20 November, 2014 11:45
A cyberespionage group has been using advanced spear-phishing techniques to steal email log-in credentials from the employees of military agencies, embassies, defense contractors and international media outlets that use Office 365's Outlook Web App.
By Lucian Constantin | 24 October, 2014 21:03
Facebook and Yahoo have developed a mechanism to prevent the owners of recycled email addresses from hijacking accounts that were registered on other sites using those addresses in the past.
By Lucian Constantin | 24 October, 2014 06:04
Many companies set up subdomains for use with external services, but then forget to disable them when they stop using those services, creating a loophole for attackers to exploit.
By Lucian Constantin | 24 October, 2014 00:57
Developers being overly trusting is one of them.
By Kenneth van Wyk | 21 May, 2013 20:56
An assessment of the information security department shows that it has a lot of growing up to do yet.
By Mathias Thurman | 05 November, 2012 11:15
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTSenior SEO ManagerNSW
- FTProgram Manager - Integration & SolutionsNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTAcquisition Marketing ExceutiveNSW
- FTStudio Design ManagerVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- FTStudio Design ManagerVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTChief Information Officer - CSIROACT
Communications service providers (CSPs) are struggling with an explosion of data traffic resulting from increased mobile usage, streaming video, resource-intensive over-thetop (OTT) applications, and smart device proliferation. At the same time, CSPs must deploy new network technologies and services to stay competitive and satisfy customers.
- UN committee calls on countries to protect right to privacy
- ASIC chief calls for focus on 'cyber resilience'
- Sony to offer refunds over misleading PS Vita ads
- NSW Rural Fire Service cuts travel costs by using video conferencing
- How multisig can alleviate Bitcoin consumer protection concerns
- Treat Bitcoin like currency, advocates tell Senate inquiry
- Hack the halls: Watch out for Cyber Monday scamathon
- NASA creates first 3D printed object in space
- Home Depot spent $43 million on data breach in just one quarter
- Breaking up is hard to do, but HP won't look back
- New eftpos debit, credit chip cards include EMV security
- San Francisco DA pushes for chip payment cards in tech's backyard
- Adobe tries again to fix Flash vulnerability
- Cybercrime reporting site launches in Australia
- Microsoft Band customers get scrooged even before holidays start