Access Control

Access Control news, trend analysis and opinion

defenses against super attackes 1
automated security defense protection

no access 71232 1280

Perdemia's Permission Analyzer: How to find out who can get access to what on your network

Access permission analysis is crucial to securing and managing your network resources and Perdemia's Permission Analyzer may be the tool you need.

Dropbox adds U2F support for better security

It's a better option for high-security environments, one analyst says

Researchers find way to steal Windows Active Directory credentials from the Internet

The technique could enable attackers to attack Windows servers hosted in the cloud

File sync services provide covert way to control hacked computers

Researchers highlight the potential use of file synchronization services for stealthy and persistent remote control

No building access card? No problem if you have new Def Con tools

A slew of new RFID hacking tools will be released at the Def Con conference next month

NSA will lose access to 'historical' phone surveillence data Nov. 29

After Nov. 29, data requests must be made on an as-needed basis to the FISA Court

Bug exposes OpenSSH servers to brute-force password guessing attacks

The keyboard-interactive authentication setting could allow for thousands of password retries, a researcher found

Ad fraud Trojan updates Flash Player so that other malware can't get in

Despite being distributed through exploit kits, the Kovter Trojan appears to be ruining their business by patching valuable flaws

Cisco leaves key to all its Unified CDM systems under doormat

Cisco's Unified Communications Domain Manager software contains a privileged account with a static password that can't be deleted or changed

VPN users, beware: You may not be as safe as you think you are

Thanks to IPv6 leakage, your data could be out there for anyone to see

Cisco plans to buy security-as-a-service provider OpenDNS

OpenDNS provides Web filtering and malware protection services to 65 million users

VMware's Identity Manager offers authentication for Web, native apps

The growing popularity of cloud apps means enterprises have to rethink indentity management.

single sign on tools review 1
Clear Choice Tests

Review: Single sign-on tools offer impressive new capabilities

Centrify edges Okta and OneLogin in seven-vendor shootout.

Windows 10 will allow apps to actively scan their content for malware

Developers will be able to have their apps talk to the locally installed antivirus programs through a new API

Cybercriminals increasingly target point of sales systems

Trustwave highlights the difference in data-breach activity between North America and the rest of the world

Memory scraping malware targets Oracle Micros point-of-sale customers

A new threat dubbed MalumPoS is being used against businesses in the hospitality, food and retail industries, researchers said

Users with weak SSH keys had access to GitHub repositories for popular projects

GitHub revoked the keys, but it's not clear if they were ever abused by attackers

Large scale attack hijacks routers through users' browsers

Researchers found a Web attack tool designed specifically to exploit vulnerabilities in routers and hijack their DNS settings

Load More