Latest Instagram password leak has exposed 10,000 plaintext credentials in the SocialCaptain app, allowing anyone to access any app profile by entering a unique user ID into a public URL.
Study on 9 billion recovered login credentials shows significant password reuse which can help cybercriminals conduct credential stuffing attacks and possible account takeover.
Owner of a botnet has leaked the access credentials for more than 515,000 servers and claimed they were changing business models to make use of cloud service providers instead.
CCPA pioneered a strong mandate for data privacy and security in the US, and now SB-327 is focusing on securing IoT devices. However, an opportunity was missed to ditch passwords altogether and advocate for a stronger method of authentication.
Attribute based access control provides a dynamic level of access control, based on the environment and conditions, needed for privacy and data protection.
State Farm, the insurance giant with more than 83 million customers, was hit by a credential stuffing attack with unknown number of customer accounts compromised.
Multi-factor authentication might not be as effective as before to secure user accounts and profiles. What are the ways used by hackers to bypass the authentication?
Since March 2019, hackers have been targeting the UN and affiliated humanitarian aid organizations with a sophisticated, mobile-centric phishing campaign to harvest Microsoft Office 365 login credentials.
Even with 64% of cloud security incidents stemming from unauthorized access, businesses are still underestimating access security with only 7% of security leaders citing account takeovers as top risk.
We look at the ease of use, reliability and strength of Apple's iPhone X new Face ID security feature. Should you keep your face (password) to yourself?