2 min read - The WindTalker exploit enables fraudsters to deduce smartphone passwords and PINs over public Wi-Fi by analyzing changes in CSI.
2 min read - Rewarding users for strong password selection can be a good way to eliminate terrible password hygiene throughout an organization.
3 min read - As countless security compromises have shown, weak passwords are a common root cause for the initial breach of a victim network.
2 min read - The SwiftKey mobile app's typing prediction feature has been generating unfamiliar phrases, emails and passwords belonging to other users.
2 min read - Shard is designed to help users track down and eliminate duplicate passwords. But what happens if cybercriminals repurpose the protective program?
3 min read - Here's the story of how I almost got hacked — and what you can learn from my close call to ensure the data breach doesn't happen to you.
2 min read - Lorrie Cranor, the chief technologist of the FTC, urged users to increase password strength rather than rely on frequent changes.
2 min read - Password access managers may be the most viable solution to the lack of security surrounding login credentials — if they are used effectively.
2 min read - Password manager LastPass was recently discovered to have serious security flaws that could leave the door open for cybercriminals.
2 min read - The St. Louis Cardinals are under investigation for allegedly hacking into and stealing information from one of the Houston Astros' internal databases.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.