eBook: Biometric Authentication For Dummies
How can you be sure that someone is who they say they are, if they’re not standing in front of you? In a digital world, how can organizations be sure that an individual attempting to access online services is who they claim to be? Or that they exis.....»»
As always, Apple homepage honors Martin Luther King, Jr
As it does every year on Martin Luther King Jr Day, Apple has devoted its homepage to remembering and honoring the US civil rights pioneer. There’s also a link to a free ebook: The Essential Martin Luther King Jr … more….....»»
Juniper fixes critical RCE in its SRX firewalls and EX switches (CVE-2024-21591)
Juniper Networks has fixed a critical pre-authentication remote code execution (RCE) vulnerability (CVE-2024-21591) in Junos OS on SRX firewalls and EX switches. About CVE-2024-21591 CVE-2024-21591 is an out-of-bounds write vulnerability that could a.....»»
Critical GitLab flaw allows account takeover without user interaction, patch quickly! (CVE-2023-7028)
A critical vulnerability in GitLab CE/EE (CVE-2023-7028) can be easily exploited by attackers to reset GitLab user account passwords. While also vulnerable, users who have two-factor authentication enabled on their account are safe from account takeo.....»»
Hackers can infect network-connected wrenches to install ransomware
Researchers identify 23 vulnerabilities, some of which can exploited with no authentication. Enlarge / The Rexroth Nutrunner, a line of torque wrench sold by Bosch Rexroth. (credit: Bosch Rexroth) Researchers have uneart.....»»
Network-connected wrenches in factories can be hacked for sabotage or ransomware
Researchers identify 23 vulnerabilities, some of which can exploited with no authentication. Enlarge / The Rexroth Nutrunner, a line of torque wrench sold by Bosch Rexroth. (credit: Bosch Rexroth) Researchers have uneart.....»»
Twilio is killing off the Authy desktop app, but Mac users have a work-around
Twilio, the maker of two-factor authentication app Authy, will be discontinuing its native desktop apps for all platforms in August, forcing users to switch over to its mobile version — but Mac users have a work-around.AuthyTwo-factor authenticatio.....»»
AuthLogParser: Open-source tool for analyzing Linux authentication logs
AuthLogParser is an open-source tool tailored for digital forensics and incident response, specifically crafted to analyze Linux authentication logs (auth.log). The tool examines the auth.log file, extracting crucial details like SSH logins, user cre.....»»
Breaking down the state of authentication
In this Help Net Security video, Bassam Al-Khalidi, co-CEO of Axiad, discusses the results of Axiad’s recent State of Authentication Survey. Key findings from the survey revealed: – 39% indicated phishing is the most feared cyberattack, while.....»»
Intellicheck announces Identity Platform advancements
Intellicheck announced advancements for digital users of the Intellicheck Identity Platform. Clients integrating the new Capture process can be up and running with no more than two simple web hooks. The new digital authentication experience does not.....»»
3 main tactics attackers use to bypass MFA
Notable security breaches have bypassed MFA to compromise taxi broker Uber, games company EA, and authentication business Okta, according to SE Labs. CISOs must bolster MFA protections SE Labs advised CISOs to step-up their efforts against attacks on.....»»
Are organizations moving away from passwords?
Passwordless authentication emerges as a calculated response, eliminating the inherent weaknesses of conventional passwords. At the heart of this evolution lies the deployment of passkeys—sophisticated cryptographic tools designed to authenticate u.....»»
How to install iOS 17.3 beta and try the new Stolen Device Protection for iPhone
Want to try out the latest iPhone security feature – Stolen Device Protection for iPhone? Read along for how to install iOS 17.3 beta for free, as well as where to turn on the new iPhone protection that requires biometric authentication and more......»»
Attackers abuse OAuth apps to initiate large-scale cryptomining and spam campaigns
Attackers are compromising high-privilege Microsoft accounts and abusing OAuth applications to launch a variety of financially-motivated attacks. Abusing OAuth applications OAuth is an open standard authentication protocol that uses tokens to grant a.....»»
1Kosmos partners with AWS to offer MFA for customer use cases
1Kosmos announced it has completed the integration of its 1Kosmos BlockID platform with Amazon Cognito. As an AWS Advanced Technology Partner, 1Kosmos enables Amazon customers to seamlessly add passwordless multi-factor authentication (MFA) to their.....»»
Stytch offers toolkit for developers to build, implement, and customize passkey-based authentication
Stytch announced its Passkeys offering, giving developers the easiest way to build, customize and maintain passkey-based authentication in their applications. Stytch’s new solution offers a flexible, API-first approach to passkeys that abstracts th.....»»
eBook: Defending the Infostealer Threat
Enterprises’ increasing digital reliance has fueled an array of cybersecurity threats. One rapidly growing area is information-stealing malware known as infostealers, which is malicious software designed to steal data. Unlike ransomware, where info.....»»
Windows may have a serious security problem on its hands
Researchers have discovered flaws in biometric sensors on Windows Hello laptops that make them easy to hack......»»
Windows Hello fingerprint security tests failed on top three laptops
While Windows laptop users like to think they have their own version of Touch ID, it appears not to offer the same level of security. The Windows Hello fingerprint authentication system on the top three laptops to use it has been put to the test by s.....»»
CyberArk unveils passwordless authentication options to reduce credential theft
CyberArk has expanded passwordless authentication capabilities with new passkeys support. Now, CyberArk Identity customers can accelerate passwordless adoption and reduce cybersecurity risk by enabling the use of passkeys to easily access apps and we.....»»
CRONT: Empowering optical tweezers with "biometric eyes"
Optothermal nanotweezers, an innovative optical manipulation technique over the past decade, have revolutionized classical optical manipulation by efficiently capturing a broader spectrum of nanoparticles. While this technique has been primarily used.....»»