Will passwords soon become a thing of the past? Have they already become obsolete?
Spate of shocking cyber attacks on universities jolt academia
It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States and other parts of the world. If the cyber attacks of the past few weeks are any indication, universities are now facing the biggest threat to information security
This Week’s Five: Arm Your IT; Secure Your Network
This Week’s Five is a weekly column of five interesting reads from all over the web, with a different topic each week.
AP Twitter account hack: Social media proves to be the most convenient platform for hackers!
Just a couple of weeks ago, we published this blog “ Beware! Your social media password could let your business down ! ” and now comes the shocking news about the hack AP’s Twitter account, which created a big embarrassment to the world’s largest and most trusted news cooperative, besides causing panic waves in the Wall Street. The overwhelming popularity of social media attracts the attention of cyber-criminals, who are looking for easy ways to harvest online identities. In fact, the job of cyber-criminals has become a lot easier in this ‘social media era’.
Beware, your social media password could let your business down!
Social Media emerges the most convenient platform for cyber-criminals; Using same password across social media and business applications makes your business vulnerable to attacks! Over 12 per cent of the world population is on social network and the number keeps growing exponentially. Those who do not own an account in Facebook or Twitter are now being viewed as those living in prehistoric times. No doubt, social media is wonderful in helping you stay connected with friends, but the sheer popularity of social media attracts the attention of cyber-criminals looking for ways to harvest identities.
Could Your Jewelry Stop Hackers?
Google has been talking about an innovative idea to replace passwords with jewelry — that’s right, jewelry. Actually, the enabling technology could be hidden in jewelry, such as a ring , which would perform secure cryptographic transactions that would obviate the need for the user to enter a password.
6 mobile security screw-ups you’re (probably) guilty of
In two weeks, the security community will flock to San Francisco for this year’s RSA Conference. With two-thirds of Internet users now accessing the Internet via their mobile devices daily and mobile malware reportedly up over 185 percent in 2012 , the hottest topic on the docket is mobile security
Beware: Hackers in your car, TV and light-bulbs?
We all know we should be careful transacting online, but are you thinking about cyber-security when you’re watching TV or driving your car? If you’re like me, those flashy new products at last week’s CES show probably got you dreaming about upgrading some of your old-school gadgets. The trend today is moving away from stand-alone devices to futuristic “connected” devices, those that can talk to the cloud or even interact with your other systems and appliances.
How about deploying a surveillance camera for Windows RDP, Telnet, SSH session actions?
Nowadays, enterprises of all sizes and types rely on surveillance cameras for physical security of their premises. With cyber-crimes looming large, effectively securing sensitive data has emerged a big challenge for all organizations – enterprises, government agencies and military establishments. Of late, internal threats seem to be far more alarming as many of the reported security incidents have been caused by trusted third-parties and malicious insiders having authorized or unauthorized privileged access to the IT resources.
World’s leading virtualization platform provider relies on Password Manager Pro to consolidate and secure privileged accounts
Success Story The R&D division of a US-based virtualization platform provider, global leader in virtualization and cloud infrastructure solutions serving over 300,000 customers experienced proliferation of complex, hard-to remember administrative passwords.