Access control and authentication - News, Features, and Slideshows
Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.
By Martyn Williams | 24 July, 2014 05:34
Tokyo police on Thursday arrested a systems engineer accused of stealing millions of customer names from the computer database of a large education firm to sell them for profit.
By Tim Hornyak | 17 July, 2014 19:40
Microsoft's widely used software for brokering network access has a critical design flaw, an Israeli security firm said, but Microsoft contends the issue has been long-known and defenses are in place.
By Jeremy Kirk | 15 July, 2014 16:53
Thousands of compromised computers are actively trying to break into point-of-sale (POS) systems using brute-force techniques to guess remote administration credentials.
By Lucian Constantin | 10 July, 2014 03:06
Mocana's Atlas platform is intended to make it easier for users to access enterprise apps from their smartphones without compromising security.
By Mikael Ricknäs | 08 July, 2014 22:02
Developers being overly trusting is one of them.
By Kenneth van Wyk | 21 May, 2013 20:56
An assessment of the information security department shows that it has a lot of growing up to do yet.
By Mathias Thurman | 05 November, 2012 11:15
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
Delivering more products, heightened quality and shortened customers with flawless execution and minimal business interruption defines your supply chain success. This report discusses a newly developed end-to-end solution with the right tools to efficiently procure, assemble, ship and deliver the goods your customers want, when they want them.
- A new tool for disasters: The personal antenna
- Phone unlocking bill clears US House, next step is president's signature
- Apple hasn't exhausted its supply of Yosemite betas
- Oracle's new in-memory database option could spark unanticipated costs, expert warns
- Bose sues Beats over headphone patents
- SEC drops probe into Facebook's pre-IPO sales disclosures
- How Microsoft's CEO sees growth for Windows Phone and Lumia
- Thanks to NASA, you can now 3D print models of satellites, probes and planets
- Russian government offers money for identifying Tor users
- EU, Google, Microsoft, Yahoo meet on 'right to be forgotten' but questions remain
- The Pirate Bay makes searching for torrents easier on mobile devices
- Changes afoot as DARPA challenge robots prep for upgrade
- Apple faces privacy suit following Chinese TV report
- Government pushes website blocks to fight piracy
- New guide aims to remove the drama of reporting software flaws