March 31, 2023
Via: Help Net SecurityOnly 9% of organizations are taking an agile, holistic and mature approach to securing identities throughout their hybrid and multi-cloud environments, according to CyberArk. A critical path for cyber resilience The data-driven model identifies 9% of organizations as those with […]
June 8, 2022
Via: Help Net SecurityThe Identity Theft Resource Center (ITRC) and LexisNexis Risk Solutions have released the Pandemic-Related Identity Fraud Crime Victim Impacts Report, which shows how individuals and government agencies have been impacted since 2020 by an unprecedented wave of government benefits identity […]
December 30, 2021
Via: Natalie DunnAccording to some estimates, cybercrime is a $6 trillion annual industry, which would qualify it as the world’s third-largest economy after the U.S. and China. There is a great deal of money to be made, and cybercriminals are constantly adopting […]
December 21, 2021
Via: Dark ReadingQuestion: How is Zero Trust evolving to be more continuous in nature in verifying trust? Ash Devata, general manager, Cisco Zero Trust and Duo Security: Zero Trust is all about assuming zero trust by default when a user is trying […]
October 12, 2021
Via: Help Net SecurityErmetic announced the results of a study about the security posture of AWS environments and their vulnerability to ransomware attacks. In virtually all of the participating organizations, identities were found that, if compromised, would place at least 90% of the […]
Application security, Cyber-crime, Identity theft, Security
February 16, 2021
Via: Security IntelligenceContact tracing apps are designed to help public health agencies connect the dots by linking confirmed carriers of novel coronavirus to recent, close-proximity interactions. In theory, this creates a protective safety net — a way for countries to manage the […]
January 11, 2021
Via: Security WeekSecurity key devices are considered highly efficient when it comes to protecting accounts against takeover attempts and, unlike other types of two-factor authentication (2FA) systems, they are much more difficult to compromise. They are recommended for securing very important accounts […]
Cyber-crime, Identity theft, Phishing
December 29, 2020
Via: Panda SecuritySpoofing is a cyberattack that occurs when a scammer is disguised as a trusted source to gain access to important data or information. Spoofing can happen through websites, emails, phone calls, texts, IP addresses and servers. Usually, the main goal […]
December 16, 2020
Via: CSO OnlineBiometrics are among the most personal forms of information requiring the strictest protections. Ironically, biometrics are increasingly being used as a primary or secondary authentication mechanism to protect access to other sensitive information. Regulators are taking notice. “The liabilities associated […]
October 16, 2020
Via: Panda SecurityYou’ve probably heard many times before that malware can be used to commit identity theft. You may also already know that identity theft is about criminals collecting enough personal information to fool people and computer systems into thinking they are […]
Cyber-crime, Identity theft, Network security, Security
September 17, 2020
Via: CSO OnlineThe COVID-19 pandemic has forced us to socially distance and do whatever we can digitally and remotely. For IT professionals, the pandemic likely brought a lot of unplanned headaches and long hours to ensure their organizations could remain securely operational […]
August 25, 2020
Via: CSO OnlineOver the past several years, experts have recognized that perhaps the best password strategy for your application logins is to have no password at all, what has been often labeled as “passwordless.” It is a bit of a misnomer, as […]
Access control, Cyber-crime, Identity theft, Security
June 22, 2020
Via: Security WeekPart of Microsoft’s Defending Democracy Program, AccountGuard was introduced in 2018 to “protect organizations that underpin democracy from cyberattacks.” Initially available to candidates for federal, state and local office in the United States and their campaigns, the service has since […]
Access control, Cyber-crime, Identity theft, Security
May 15, 2020
Via: Security IntelligenceA quick web search for “chatbots and security” brings up results warning you about the security risks of using these virtual agents. Dig a little deeper, however, and you’ll find that this artificial intelligence (AI) technology could actually help address […]
Cyber-crime, Email security, Identity theft
November 5, 2019
Via: Security WeekIdentity deception attacks continue to grow, but the type of attack seems to be changing. During Q3, 2019, phishing campaigns impersonating brands dropped by 6% over the previous quarter. Attacks impersonating individuals, however, increased by 10%. The drop in brand […]
October 9, 2019
Via: Help Net Security850,000 domains worldwide now have DMARC records, a 5x increase since 2016, according to Valimail. However, less than 17% of global DMARC records are at enforcement — meaning fake emails that appear to come from those domains are still arriving […]
November 14, 2018
Via: TechRadarIdentity fraud just isn’t going away, and it continues to be a growing concern in 2018. If you’re (quite rightly) concerned about falling for one of the many scams that have been doing the rounds on the internet, then our […]
January 11, 2018
Via: Dark ReadingIf identity is established based on one thing you know and one thing you have, the latter should not also be a thing you know because in the sharing economy, we share everything. If you’ve been on Facebook any length […]
July 5, 2017
Via: Security IntelligenceIdentity and access management (IAM) is a mature and well understood domain of security. That doesn’t mean it’s static. While IAM is commonly associated with security — indeed, it is an essential part of a holistic security program — many […]
Access control, Identity theft
March 16, 2017
Via: Naked SecurityFingerprint. Voice. Face. Today’s smartphones already include a wide variety of biometrics features that allow you to unlock your phone, access apps and even authorize payments. Now, researchers at Hong Kong Baptist University have come up with a new identity […]