Authentification

Hackers Bypassing MFA To Access Cloud Accounts, Warn CISA

US cyber agency warn hackers are bypassing multi-factor authentication (MFA) authentication protocols to compromise cloud accounts

6 days ago

CES 2021: Ring Trials End-To-End Encryption In Smart Doorbells

Privacy move. Smart doorbell maker adds encryption to protect video streams after security scares

6 days ago

Signal Installations Surge Amid WhatsApp Data Concerns

Research shows installations of Signal messaging app approaching one million a day, amid concern over WhatsApp data policy update

1 week ago

NEC Facial Recognition Works Despite Masks

NEC launches facial recognition system that can identify people, even if they are wearing masks to protect against Coronavirus

2 weeks ago

Signal Founder Dismisses Cellebrite Encryption Crack Claim

Security firm Cellebrite alleges it has cracked encryption of the most secure messaging app on the market, but Signal founder…

4 weeks ago

Facebook To Allow Physical Security Keys Next Year

Users will be able to register third party hardware keys with Facebook mobile app in an effort to tighten account…

4 weeks ago

Children At Risk From End-to-End Encryption, Says Report

Plans by social media firms to widen the use of end-to-end encryption will put children a risk, Children Commissioner warns

1 month ago

Twitter To Relaunch Verification Scheme In 2021

New Twitter policy on how prominent people and organisations can earn the blue tick verification mark, is to be launched…

2 months ago

World’s Worse Passwords Revealed By NordPass

Oh dear, Despite persistent cyber threats, research from NordPass reveals the most commonly used password is still '123456'

2 months ago

How Voice Control is Coming to Your Enterprise

As smart speakers continue to expand in the home, using voice to control a range of devices is now familiar.…

3 months ago

Amazon One Scanner To Use Veins In Palm For Payments

Amazon One device will scan the veins in a human hand to authorise supermarket checkout payments for example, or entry…

4 months ago

Your Post Tap Business: The Future Is Voice

Learn how voice is about to become an essential component of your business. Discover why your business must use voice…

5 months ago

Bletchley Park Faces Funding Crisis, Prepares To Axe Staff

World war 2 code breaking centre is facing a funding crisis due to Coronavirus pandemic, with third of workforce being…

5 months ago

COVID Commerce: How Retailing Will Be Reshaped By The Pandemic

COVID-19 may have changed the retail landscape forever. What will retailing look like in a post-COVID-19 world? Will the high…

6 months ago

Hacker Forums Contain Over 15 Billion Stolen Credentials

Sheer scale of stolen user data available online on hacker foums revealed in a report from data loss detection firm…

6 months ago

Police ‘Crack’ EncroChat Encryption, Resulting In Hundreds Of Arrests

Organised crime around Europe has been dealt a huge blow after authorities cracked the encryption of a messaging system used…

7 months ago

Tech Firms Pledge Child Abuse Disclosures To Blunt Anti-Encryption Drive

Strategic move? Google, Facebook, Microsoft pledge to improve and standardise annual disclosures around online child exploitation

7 months ago

Google Finally Addresses Pixel 4 Face Unlock Flaw

Five months later. Google updates Pixel software to address problem with flagship Pixel 4 that can be unlocked if a…

10 months ago

The Spooky Network: Is the quantum network the future of the Internet?

Perfecting the quantum computer could finally be in reach. Data and communications are now an enterprise’s most precious asset. If…

11 months ago

FinTech Part 2: Building the FinTech Ecosystem

How are FinTech companies innovating? What's the tech that sits behind the development of their apps and support networks, and…

11 months ago

US Bill To Clamp Down On End-To-End Encryption

US lawmakers intend to introduce bill in coming weeks that could clamp down on tech firms offering their users end-to-end…

11 months ago

Amazon Ring Enables 2FA After Privacy Scares

Ring division adds an extra layer of security to its smart home devices after a number of unsettling cyber-security incidents

11 months ago

Automation Part 2: Your First Robot Employee

Automation in the workplace will have many forms. The rise of AI could usher in new businesses processes that need…

11 months ago

WhatsApp Hits Two Billion Users, Defends Encryption

Facebook-owned messaging app now used by a staggering 2 billion people, as platform defends its default use of end-to-end encryption

11 months ago

Apple Joins FIDO Alliance To Replace Passwords With Trusted Devices

Significant development? The FIDO Alliance that aims to remove the need for passwords, signs Apple as new board member

11 months ago

The Tap Economy Part 1: Screen Commerce

How lucrative could the mobile economy become? In part 1 of this series, we consider the development of M-commerce and…

12 months ago

FinTech Part 1: A New Payments and Banking Landscape

As one of the fastest-growing sectors, FinTech is building technologies and services that will touch every consumer and business. In…

12 months ago

Apple Dropped iCloud Encryption Plan After FBI Pressure – Report

Privacy versus security. FBI complaint two years ago halted Apple's plans to fully encrypt iCloud backups, it is alleged in…

12 months ago

Google Allows iPhones To Be Used As 2FA Physical Security Key

Update to Google's Smart Lock app for iOS devices means that modern iPhones can be used as a physical security…

1 year ago

Apple Hits Back Over ‘Refusal’ To Unlock Pensacola Shooter’s iPhones

Here we go again. US Attorney General says Apple failed to help unlock terrorist iPhones, but Apple says it has…

1 year ago