Many high-profile online services are vulnerable to a new type of attack that could enable fraudsters to intercept password reset requests.
With the most recent draft of its Digital Identity Guidelines, NIST revised many of its federal recommendations regarding passwords and access management.
Upon analyzing a massive password dump, Duo Labs concluded that users are slowly but surely adopting recommended password security best practices.
The continued reuse of weak credentials within the enterprise has allowed fraudsters to clean up their acts. World Password Day reminds us to do the same.
If you're writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.
Security professionals who fail to secure their social media accounts create openings for cybercriminals to access more critical, work-related data.
DblTek GSM gateways have a hidden backdoor password that allows root shell access. How can users protect themselves from this vulnerability?
By reusing passwords across multiple services, users make it easier for cybercriminals to breach all their accounts, not to mention company databases.
Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.
A 6-year-old child ordered $250 worth of merchandise by using her sleeping mother's fingerprint to satisfy her phone's authentication requirements.