Access Control

Access Control | News, how-tos, features, reviews, and videos

File sync services provide covert way to control hacked computers

Researchers highlight the potential use of file synchronization services for stealthy and persistent remote control

No building access card? No problem if you have new Def Con tools

A slew of new RFID hacking tools will be released at the Def Con conference next month

NSA will lose access to 'historical' phone surveillence data Nov. 29

After Nov. 29, data requests must be made on an as-needed basis to the FISA Court

Bug exposes OpenSSH servers to brute-force password guessing attacks

The keyboard-interactive authentication setting could allow for thousands of password retries, a researcher found

Ad fraud Trojan updates Flash Player so that other malware can't get in

Despite being distributed through exploit kits, the Kovter Trojan appears to be ruining their business by patching valuable flaws

Cisco leaves key to all its Unified CDM systems under doormat

Cisco's Unified Communications Domain Manager software contains a privileged account with a static password that can't be deleted or changed

VPN users, beware: You may not be as safe as you think you are

Thanks to IPv6 leakage, your data could be out there for anyone to see

Cisco plans to buy security-as-a-service provider OpenDNS

OpenDNS provides Web filtering and malware protection services to 65 million users

Authenticity required. Password?

IoT is the password killer we've been waiting for

IoT, with its tiny screens & headless devices, will drive an authentication revolution. It's a short leap from the kind of two-factor authentication used on the Apple Watch to proximity-based authentication that does away with any...

VMware's Identity Manager offers authentication for Web, native apps

The growing popularity of cloud apps means enterprises have to rethink indentity management.

FitBit Ultra

What mapping fitness and sleep data can reveal about us

As wearable devices and mobile fitness trackers become more popular, users must be aware of where their data is going and how to protect their private information from unwanted sources.

single sign on tools review 1

Review: Single sign-on tools offer impressive new capabilities

Centrify edges Okta and OneLogin in seven-vendor shootout.

Windows 10 will allow apps to actively scan their content for malware

Developers will be able to have their apps talk to the locally installed antivirus programs through a new API

Cybercriminals increasingly target point of sales systems

Trustwave highlights the difference in data-breach activity between North America and the rest of the world

Memory scraping malware targets Oracle Micros point-of-sale customers

A new threat dubbed MalumPoS is being used against businesses in the hospitality, food and retail industries, researchers said

Users with weak SSH keys had access to GitHub repositories for popular projects

GitHub revoked the keys, but it's not clear if they were ever abused by attackers

Large scale attack hijacks routers through users' browsers

Researchers found a Web attack tool designed specifically to exploit vulnerabilities in routers and hijack their DNS settings

In desperation, many ransomware victims plead with attackers

TeslaCrypt creators negotiated with victims, earned over $76,000 in two months

The best way to protect passwords may be creating fake ones

A research project, NoCrack, creates plausible decoy password vaults to confuse attackers

Give me my Attribute mapping back for Sponsor Groups

Cisco ISE 1.3 introduced a completely re-written Guest solution that greatly simplifies the deployment and allows for high-levels of customization. Things have been simplified GREATLY, but unfortunately some of the power got lost at...

Load More