The National Institute for Standards and Technology is working on new password guidelines which will be mandated for government sector users, and strongly recommended for businesses as well.  Still in draft from, the standards can be found on the document Special Publication 800-63-3: Digital Authentication Guidelines.   Here are some of the recommended changes, so far.  We approve, and in many cases have been ...
SEP

When you lose your login credentials to an online account, it can be devastating.  Depending on what was compromised and what was lost, you may have an expensive and time-consuming task on your hands.  So the bad guys took your user ID and password, or some other personal information.  Was it worth it?  There is an active resale market for this information, and ...
We warned our readers about the 
Holy acronyms Batman!  What the heck does this headline mean?  Well, the National Institute for Standards and Technology (NIST) has removed two-factor authentication (TFA) via short-messaging service (SMS) from the approved list of two-factor authentication methods.  The reason is that SMS is an unencrypted service, and the lack of encryption makes it too insecure for use in Federal authentication systems.  NIST is recommending that all ...
Bruce Schneier had an 
Actually there are way more than ten ways, but here are some I see all the time.  We can play this like a game, so go ahead and give yourself a point for each one of these that apply to you.  This game scores like golf – low score wins.
Maybe you like the idea of two-factor authentication, but the Google Authenticator smartphone app seems too cumbersome.  Or maybe you are not a smartphone owner, because you don’t like the idea of a phone that can track your location to within a few feet, and keeps sharing all your personal data with the apps on your phone.  So you own a flip phone ...
Google Authenticator is my favorite go-to app for setting up two-factor authentication.  But what if you want to remove an account from Google Authenticator?
The Apple OSX platform has long held the cache of being invulnerable to attack.  Cyber-criminals have be crafting more exploits to target Macs, iPhones, and iPads, especially since 2012.  The reason for this, as explored in a recent article on