Browsing tag

authentication

‘EarEcho’ Lets You Unlock Your Smartphone ‘Using Your Ear’

The authentication process on smartphones has evolved over the years. What started as passwords, changed to fingerprint and facial recognition subsequently. Now researchers have invented a new biometric authentication technique that involves unlocking your smartphone using in-ear earbuds. Zhanpeng Jin, associate professor in the Department of Computer Science and Engineering at University at Buffalo, and […]

Your Android Phone Is Now A Physical Security Key — Here’s How To Use It

Two-factor authentication is one of the most reliable authentication methods. However, if anybody has access to the authentication codes received in messages, your accounts are at risk. This is why Google introduced Titan Security Key, a 2FA device that acts as a physical key. Now, Google has further strengthened the 2FA system by making your Android […]

Vulnerability in Fortnite authentication system affects user accounts

Security investigators were able to steal access tokens attacking an Epic Games subdomain According to network security and ethical hacking specialists from the International Institute of Cyber Security, a recently discovered vulnerability in the account authentication system of Epic Games for the popular videogame Fortnite left exposed the gamers’ accounts. According to reports, malicious users […]

USB-IF Launches USB Type-C Authentication Program To Protect Against From Malicious Devices

USB-IF announced USB Type-C Authentication Program to confirm the authencity of the USB device USB device, USB cable or USB charger. The Authentication program is the milestone for USB security protocol. The authentication program protect against non-compliant USB chargers and to mitigate risks from malicious firmware/hardware in USB devices attempting to exploit a USB connection. […]

Thetis FIDO U2F Security key – Universal Two Factor Authentication USB

FIDO U2F Security key is a personal encryption method which individualizes your online security by providing a secondary layer of encryption via the USB port. Platform and OS Support: It can provide you a strong protection for your Google, Facebook, Dropbox, Github, Salesforce and other website accounts which support U2F protocol. It can be used […]

Intel and Lenovo are trying to build UAF and U2F authentication into their devices

81 percent of data breaks last year involved weak, default or stolen passwords, and phishing attacks have advanced 65 percent year-on-year. Protecting online privacy, status and all types of data is more significant than ever demanding more robust security applications. Lenovo and Intel today published the first PC-ready built-in authentication steps to support users’ online […]

Nzyme – Wireless Monitoring, Intrusion Detection & Forensics

Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a WiFi adapter that supports monitor mode. Think about this like a long-term (months or years) distributed Wireshark/tcpdump that can be analyzed and filtered […]

VulcanJS: Easiest Way To Build Full Stack Web Applications

Short Bytes: VulcanJS is a full stack toolkit based on React, Redux, Apollo GraphQL, and Meteor created by Sacha Greif. It allows a developer to make full stack apps easily and quickly using built-in User Accounts and Permissions, Auto Generated Forms and Schemas, Lots of Example Code and Boilerplate, Optimistic UI Updates and more. In 2012, […]

Security Is PAINful — The Four Cornerstones Of Security

Short Bytes: Digital security is always a hot topic, but its growth is accelerating. In order to implement security, you need to understand security. But in order to really understand it, you need to start with the fundamentals — Privacy, Authentication, Integrity, and Nonrepudiation. Security is a trade-off, there’s no denying that. Security makes things […]