June 21, 2016 Akamai Says Subtlety Is Out, Brute Force Is In for Identity Theft 2 min read - New security research from Akamai found that brute-force attacks are making a comeback thanks to their low-risk, high-reward nature.
X-Force June 3, 2016 Compromised Before My Very Eyes: How I Almost Got Hacked 3 min read - Here's the story of how I almost got hacked — and what you can learn from my close call to ensure the data breach doesn't happen to you.
Identity & Access May 25, 2016 How to Help Prevent a Social Media Hack 4 min read - Avoiding a damaging and embarrassing social media hack starts with building security into all aspects of the organization and embracing best practices.
March 14, 2016 Password Strength May Trump Frequent Changes, FTC Expert Says 2 min read - Lorrie Cranor, the chief technologist of the FTC, urged users to increase password strength rather than rely on frequent changes.
January 26, 2016 Are You Even Trying? Password Hacks Still Happening as Users Miss the Message 3 min read - Despite numerous warnings and regulations regarding passwords, users continue to use weak personal codes and leave themselves open to password hacks.
December 11, 2015 Password Recovery: Open-Source Hashcat Goes on the Prowl 3 min read - Hashcat is one password recovery tool that could improve the outlook of general security — even if other password managers have been broken in the past.
November 19, 2015 LastPass Gets a Failing Grade From Researchers Who Say Passwords Could Be Exposed 2 min read - Password manager LastPass was recently discovered to have serious security flaws that could leave the door open for cybercriminals.
Application Security October 29, 2015 Britain’s GCHQ Wants to Help You Improve Your Password Strength 2 min read - We use too many passwords, and the majority of the time, those passwords are weak. Improving password strength is key to boosting cybersecurity.
Identity & Access October 19, 2015 Your Evolving Digital Life: The Need for More Secure Authentication 2 min read - Biometrics and more secure types of authentication may be the next stage of digital security, designed to keep up with rapidly advancing technologies.
Data Protection June 18, 2015 Stealing Bases With Leaked Passwords 2 min read - The St. Louis Cardinals are under investigation for allegedly hacking into and stealing information from one of the Houston Astros' internal databases.