Access Control

Access Control | News, how-tos, features, reviews, and videos

At least 700,000 routers given to customers by ISPs are vulnerable to hacking

The devices have serious flaws that enable unauthorized remote access and DNS hijacking, a researcher found

Windows 10 embraces iris scans, facial recognition

Microsoft is embracing biometric login with a new feature of Windows 10 that can recognize faces, fingerprints and irises for authentication it claims is more secure than passwords.

EMET security tool updated to prevent VBScript God Mode attacks

Microsoft was forced to release EMET 5.2 again because customers experienced issues with the first variant

Yahoo's new on-demand password system is no replacement for two-factor authentication

The new authentication option offers better security than static passwords, but it's not as strong as two-step verification

BlackBerry teams with Samsung and IBM to offer governments a secure tablet

The SecuTablet is a modified Samsung Galaxy Tab S 10.5 bundled with security management software and a hardware encryption module

Tool allows account hijacking on sites that use Facebook Login

Attackers can force users to associate their accounts on other sites with malicious Facebook accounts

Windows systems are also vulnerable to FREAK attacks

A recently disclosed vulnerability in SSL/TLS implementations also affects Microsoft's Schannel crypto library and Internet Explorer

mobile fingerprint identification

Biometric security is on the rise

Does biometrics have a huge role to play in corporate security programs? We asked several experts to weigh in on the pros and cons of biometric security.

DoCoMo app shares SIM credentials with offline devices

Smartphones with new Qualcomm chipsets could send SIM subscriber identities to multiple offline devices

Flaw in popular Web analytics plug-in exposes WordPress sites to hacking

Attackers can easily crack cryptographic keys used by the WP-Slimstat plug-in and use them to read information from a site's database

TrueCrypt audit back on track after silence and uncertainty

Phase two of the project will begin shortly and will be done by a professional team of consultants

Information disclosure flaw exposes Netgear wireless routers to attacks

The vulnerability allows attackers to extract admin passwords and wireless network keys

Personal weather stations can expose your Wi-Fi network

Netatmo weather stations upload Wi-Fi passwords and SSIDs to the company's servers over insecure connections

The trouble with CAPTCHAs

Ian McNabb, a member of a comedy group named Scotch Moses, called my attention to their new video after seeing a post I ran recently about Apple co-founder Steve Jobs living on through CAPTCHA. This new video brought me back to...

Jeb Bush's email dump puts constituents' personal data online

The emails posted on a Bush website included personal data such as Social Security numbers

5 technologies that betrayed Silk Road's anonymity

Even technologies designed to preserve privacy can reveal identities when not used thoughtfully

DDoS malware for Linux systems comes with sophisticated custom-built rootkit

XOR.DDoS is distributed through SSH brute-force password guessing attacks

Siemens patches critical flaws in industrial wireless gear

The vulnerabilities allow attackers to take control of affected Ruggedcom WIN systems

Dangerous IE vulnerability opens door to powerful phishing attacks

The flaw can be used to steal authentication cookies and inject rogue code into websites

iris scan security 138208300

Beyond passwords with biometric technology

Biometric technologies can supplement or even replace passwords entirely when used in conjunction with a password management program.

Load More