Upon analyzing a massive password dump, Duo Labs concluded that users are slowly but surely adopting recommended password security best practices.
The continued reuse of weak credentials within the enterprise has allowed fraudsters to clean up their acts. World Password Day reminds us to do the same.
If you're writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.
Security professionals who fail to secure their social media accounts create openings for cybercriminals to access more critical, work-related data.
DblTek GSM gateways have a hidden backdoor password that allows root shell access. How can users protect themselves from this vulnerability?
By reusing passwords across multiple services, users make it easier for cybercriminals to breach all their accounts, not to mention company databases.
Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.
A 6-year-old child ordered $250 worth of merchandise by using her sleeping mother's fingerprint to satisfy her phone's authentication requirements.
Credential-stuffing schemes rely on the widespread, irresponsible practice of using the same login credentials to access multiples accounts.
Cybercriminals leveraged poor password hygiene among users and administrators to compromise nearly 30,000 databases on MongoDB servers.