Your Brain Waves Could Be Your Password

brainwavesWe have been relying on the trusty password for years, but as password cracking technologies improve, even longer and more complex passwords are being solved and sold on rainbow tables.  So passwords are for the most part over.  Two factor authentication is possibly a solution, but biometrics are becoming a big part of what is next in the field of user authentication.  We have already seen fingerprint scanners on some laptops, ...

Continue Reading →
0

LinkedIn Passwords Found on Russian Site

linkedin-logoIf you are on LinkedIn, as I am, today is a good day to change your password.  It seems that about 6.5 million LinkedIn usernames an password have found their way onto a Russian cyber-crime website.  While LinkedIn initially disputed the report of security researcher Per Thorsheim, they recently admitted that they had lost control of some users’ credentials and Continue Reading →

0

Windows 10 Security Upgrades: Hello, Passport, FIDO

Windows10HelloWindows 10 will be featuring a built in security feature called Hello, as well as Passport, for online security, and is supporting the FIDO Alliance as well.  Hello will use fingerprint, facial recognition or iris scanning to authenticate you to your computer, and from there, authenticate you to your domain or workgroup resources.  The facial recognition camera will ...

Continue Reading →
0

Samsung Testing Iris Recognition

As the age of password authentication falls to newer and faster password cracking hardware, software, and list building tools, technologists have been looking at other authentication methods.  Many of these techniques we have covered here: two-factor authentication (2FA), secure key, smartphone authentication apps, Google’s USB security dongle, fingerprint readers, and other biometrics.

Recently, Samsung, together with SRI, have started working on an iris recognition authentication methodology called IOM or “Iris On the Move.”  The human iris, the colored part of the eye, ...

Continue Reading →
0

Personal Information: What is the Worst to Lose?

anthem-250I was reading an article on Sophos about the Anthem Healthcare breach, and putting this information together with some other articles I have read recently, and this question came to mind: what personal information is the worst to lose?  In the Anthem breach, people lost information that included their “names, dates of birth, member ID/social security numbers, addresses, phone numbers, email ...

Continue Reading →
0

1.2 Billion User Names and Passwords For Sale

Is it time to change your password?  Now that security researcher Alex Holden, of Hold Security in Milwaukee has uncovered a huge trove of stolen user credentials on the Dark Net, you might as well assume that yours are in this mammoth collection.

Alex Holden was born in the Ukraine, and his current surname is not the one he was given at birth.  But he discovered that Russian cyber-criminals had gathered 542 million email addresses and 1.2 billion unique email and ...

Continue Reading →
0

2FA–When a Password Is Not Enough

Two Factor Authentication, also known as 2FA or TFA, is becoming an attractive, and more available option to using just a user name and password combination as your only online security.  Here’s why.

Typical security systems rely on some subset of the authentication triad:  something you know, something you have, or something you are.  Simple security methods rely on having one of the three.  This is the problem with simple security – an attacker simply needs to acquire the one bit ...

Continue Reading →
0
Page 8 of 8 «...45678