Correct identification of an individual using a computer or service is important because it represents the accountability of the person identified. If...
Following the examples of Google, Facebook, Yahoo and DropBox, Twitter is reportedly ready to roll out a two factor sign in process...
In his summary of New Year predictions by security researchers here at ESET, Stephen Cobb pointed to expanded efforts by malware authors...
According to the Deloitte Technology Trends 2013 report more than 90 per cent of user-generated passwords are weak and vulnerable to hacking,...
[UPDATE #1: (21 Dec 2012, 5:30PM) ESET Researcher Cameron Camp has just published the second part of this series on securing your...
Online passwords are a pain, and not just when you have to type them to access your online bank account or shop...
There is very little research data on PIN prevalence available, so analysis of a new dataset of 4-digit passcodes can't be ignored.
Phish, Phowl, and Passwords I spend a lot of time defending educational as opposed to purely technical solutions to security. Not that...
Sharing details of the hack that “wiped his life” has earned Mat Honan a place in the annals of information system security;...
Changing the passwords on your online accounts might not sound like a fun weekend activity, but that’s what I did last weekend....
If a service leaks your credentials, your options are limited, but changing all your passwords to something harder to guess/break is never...
It's important to know the worst password choices, but also the worst choices for numeric passcodes.
Employee use of personally-owned computing devices for work-related purposes–known as Bring Your Own Device or BYOD–is not a new trend and security...
A continuation on: Time to check your DNS settings? After 7 March 2012, lots of people potentially can be hit as their...
Dazzlepod is saying ... if your account name comes up, change your current password ... why not assume that your account is...
The Reuters news agency reported earlier today a sudden increase in violent and pornographic images and videos on Facebook. A quick review...
How do you know a service is legitimate and safe? We all have to trust by proxy sometimes, but it just doesn't...
Forensic software developer PassWare announced a new version of its eponymous software forensics kit on Tuesday. Already several news sources are writing...
...on the Twitter account owned by LulzSec that they had turned their attention to the NHS. Curiously enough, they seem to have...
...here's a blog in stark contrast to Urban Schrott's blog about good password practice in Ireland ... Troy Hunt ran an analysis...
Greetings Dear Reader, We have published guidance material previously on passwords and passphrases, some are blogs and some are lengthier depending on...