Identity Security Tool

Identity Security Tool

According to a recent report from Verizon, 81% of breaches are a result of stolen and/or weak passwords. That’s a staggering number and one that has only been increasing over the years ...

How to secure your smart home | Avast

We live in a connected world. Globally, we’ve become a tighter community, while locally, we’ve become more global. The internet has delivered on convenience, allowing anyone with a connection to see, learn ...

Tips to Stay Safe in the IoT World

Once considered a “fad,” the Internet of Things (IoT) is now here to stay. It thrives in inter-connectivity though, making it a target of malicious programs and attacks. This is especially true ...

Reasonably Clever Extortion E-mail Based on Password Theft

Imagine you've gotten your hands on a file of e-mail addresses and passwords. You want to monetize it, but the site it's for isn't very valuable. How do you use it? You ...

WPA3

Everyone is writing about the new WPA3 Wi-Fi security standard, and how it improves security over the current WPA2 standard. This summary is as good as any other: The first big new ...

Recovering Keyboard Inputs through Thermal Imaging

Researchers at the University of California, Irvine, are able to recover user passwords by way of thermal imaging. The tech is pretty straightforward, but it's interesting to think about the types of ...
Future Without Passwords

Moving Slowly Toward a Future Without Passwords

It seems like every week brings some sort of new password-related frustration. Usually it involves a data breach of some website where passwords weren’t encrypted and are now compromised. But there are ...
Security Boulevard
Simple Password Management

Simple Password Management

One of the biggest concerns for IT admins is managing end user passwords. With so many services that users are leveraging across their personal and professional lives, it is easy to be ...

Bypassing Passcodes in iOS

Last week, a story was going around explaining how to brute-force an iOS password. Basically, the trick was to plug the phone into an external keyboard and trying every PIN at once: ...
Router malware worse than experts realize

Router malware worse than experts realize

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses ...
Loading...