Shaggy Dogma: Passwords and Social Over‑Engineering
Given the ‘nightmare’ that is password management, is Microsoft right to say that it’s sometimes OK to re-use the same memorable password on several sites?
Browsing category
Given the ‘nightmare’ that is password management, is Microsoft right to say that it’s sometimes OK to re-use the same memorable password on several sites?
A security researcher has built a remote control which hijacks any nearby Chromecast highlighting a Wi-Fi security issue, which allows an attacker to play a ‘surprise’ video on nearby gadgets.
A Tweet from an official Samsung Galaxy Note 4 account has dropped a very unsubtle hint that its upcoming Galaxy Note 4 handheld may feature a retina scanner – offering a significantly higher level of password security.
A new smartwatch, Fidelys, aims to bring a new level of biometric security to our lives with an ultra-secure infrared iris-scanning camera – putting the fingerprint swipe pads of phones such as iPhone 5S and Samsung’s Galaxy S5 in the shade.
Handing out Wi-Fi passwords to Android L users just got easier, thanks to a secure NFC method of password sharing, meaning the user never physically sees the Wi-Fi password – it’s decrypted by their device.
A flaw in PayPal’s two-factor authentication could allow attackers to gain access to up to 143 million PayPal accounts. The vulnerability affected users logging into PayPal via an app on their Android or iOS device, according to the Financial Times’ report.
Google’s upcoming Android L update will do away with passwords – at least for dedicated Google fans, with Google devices such as Android Wear watches used to authenticate users instead of PIN codes or passwords.
The Wi-Fi network name and password for the security center at the World Cup were accidentally leaked online by a newspaper, and rapidly spread on social media, being retweeted more than 2,000 times.
Note-taking and archiving app Evernote has announced that its discussion forum has been hacked, compromising some users’ passwords, dates of birth and email addresses.
Even smartphone and tablet users who choose a four-digit PIN to protect their device are vulnerable to “shoulder surfers” glimpsing the code and using it later – but an older form of password could come to the rescue…
Ex-employees often still have full access to the network of their previous employer, leaving the company open to “revenge attacks” – or just practical jokes.
Fernando Corbato, the MIT computer scientist widely credited with inventing the computer password, says that he and his colleagues could not foresee the World Wide Web from the early Sixties – and passwords have now become “kind of a nightmare.”
High-end Samsung phones could soon ship with a biometric scanner which puts fingerprint-swipe buttons (as seen in both Samsung and Apple’s flagship smartphones) in the shade, security-wise – an iris scanner.
Twitter has added more security measures to its site – making password resets easier, and making it trickier for cybercriminals to log in to accounts.
Shopping via mobile devices is about to receive a dual boost this fall, if the latest rumors are correct – with Samsung about to join Apple with a high-end tablet built with fingerprint security built in.
At 15 payment machines dotted around the Swedish city of Lund, people can buy items without needing a card – or a phone equipped with a “Near Field” chip. All that’s required are the correct veins.
Samsung has upstaged rival Apple with a fingerprint-locked version of the password-vault app LastPass for its flagship Samsung Galaxy S5, available free on Google Play from today. One swipe unlocks ANY app or site on the phone.
Parents who simply hand an iPhone or iPad to a child and let them play a favorite game risk children buying expensive in-game items. But the new version of iOS has some great defenses built in.
New evidence has emerged that the new iPad will have fingerprint security built in, as found on the Apple iPhone 5S.
Google’s popular Chromebook laptops could soon do away with passwords entirely with a new system where simply bringing a phone near the laptop opens up the OS.
Two-thirds of the respondents to the survey admitted to using various methods to check on children “without their knowledge” – and one-fifth had found “incriminating” posts which they confronted children about.