Authentication without Passwords?

I have been warning about the weakness of the password for a number of years.  Passwords no longer provide strong security.  Passwords are too easy to crack using automated techniques, and are stored insecurely in many environments.  Most passwords are too short, or easily guessable.  Many users reuse the same password on multiple sites.  But the password remains the most popular form of authentication among most users.  Two-factor and multi-factor authentication ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Home Routers Lack Basic Linux Security

More disconcerting news for router owners – a new assessment of 28 popular models for home users failed to find a single one with firmware that had fully enabled underlying security hardening features offered by Linux.

CITL (Cyber Independent Testing Laboratories) says it made this unexpected discovery after analysing firmware images from Asus, ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Glitter bomb engineer exacts revenge on parcel thieves

Everyone else has reported this Christmas gem, why shouldn’t we? NASA engineer Mark Rober “over-engineered the crap” out of it, including motion detection, geofencing, and 4 cameras to record some priceless reactions.  Here is the YouTube video.


Dark web goldmine busted by Europol

What’s the ...

Continue Reading →
0

A Timeline of Russian Cyber-Exploits

We have been investigating Russian cyber-attacks this week.  Today we publish a timeline of Russian cyber-activities.  In the interest of space, I am publishing just the timeline with little descriptive content.  I have included a download link to a PDF and spreadsheet of the timeline with more detail, and links to sources.

Notice how these cyber attacks started out in 2004 as small, unsophisticated ...

Continue Reading →
0
Page 2 of 147 12345...»