September 12, 2017

The threat of a cyber attack by hackers or rogue nation states with access to quantum computers is becoming real enough that scientists and public officials are convening here this week in part to urge companies to develop a plan for defense.

More than 150 cryptographers, business executives and public officials attended the first day of the three-day Quantum Safe Workshop, hosted by organizations including the University of Waterloo’s Institute for Quantum Computing, the European Telecommunications Standards Institute and United Kingdom’s Quantum Technology Hub for Quantum Communications.

August 14, 2017

"Accessing privileged accounts is the hacker's number one choice of the easiest and fastest way to get access to critical data according to a new study.

Privileged account solutions specialist Thycotic carried out a survey of more than 250 hackers at 2017's Black Hat conference and found that 32 percent of respondents see privileged accounts as the best way of getting hold of sensitive data, with 27 percent preferring access to user email accounts."

Click here for link

July 09, 2017

For years, two-factor authentication has been the most important advice in personal cybersecurity — one that consumer tech companies were surprisingly slow to recognize. The movement seemed to coalesce in 2012, after journalist Mat Honan saw hackers compromise his Twitter, Amazon, and iCloud accounts, an incident he later detailed in Wired. At the time, few companies offered easy forms of two-factor, leaving limited options for users worried about a Honan-style hack. The result was a massive public campaign that demanded companies to adopt the feature, presenting two-factor as a simple, effective way to block account takeovers.

Click here for link

February 27, 2017

"The overall results were extremely worrying and revealed that password manager applications, despite their claims, do not provide enough protection mechanisms for the stored passwords and credentials," the group said. "Instead, they abuse the users' confidence and expose them to high risks."

Click here for link

November 30, 2016

"Almost all (96%) respondents expect that their organisation will expand the use of two-factor authentication to protect applications in the future, with over half (55%) expecting this to happen within the next year. On average, respondents expect that it will be 13 months before their organisation expands its use of two-factor authentication to protect applications."

Click here for link

August 07, 2016

"The flaws, disclosed by security firm Check Point, could open hundreds of millions of Android products with Qualcomm chips to malware."

Click here for link

July 26, 2016

"SMS-based authentication is easy to implement and accessible to many users, but it is also insecure. Now NIST plans to drop it from its two-factor authentication guidelines."

Click here for link

September 22, 2015

"When hackers steal your password, you change it. When hackers steal your fingerprints, they’ve got an unchangeable credential that lets them spoof your identity for life. When they steal 5.6 million of those irrevocable biometric identifiers from U.S. federal employees—many with secret clearances—well, that’s very bad."

Click here for link

Interersting Links

Kaspersky Live Hack Map - https://cybermap.kaspersky.com/#

World's Biggest Data Breaches - http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/