Ample criticism has been lobbed toward Twitter after Tuesday's false AP tweet that President Obama was injured in an apparent attack on the White House. But could the microblogging service have prevented this?
Both companies strengthened identity verification policies for customers after a tech writer's online accounts were hacked.
Considering the endless march of breaches, it may be time to scrap the belief that adequate passwords -- or even passphrases -- can prevent hackers from breaking into corporate environments. Instead, security pros should focus their efforts on gaining visibility into their networks.
Be wary of vendor messaging in light of today's threats, as it may be misguided. Organizations can cope with the latest concerns by applying tried-and-true security best practices.
The feature, which is currently available for users in the U.S. Canada, India, and the Philippines, requires a second form of verification beyond a password for any "suspicious" login attempt.
As attackers have found a way to break traditional online banking security controls, recently issued guidelines offer some new advice for financial institutions.
The long-awaited update to the Federal Financial Institutions Examination Council (FFIEC) guidelines around authentication has been released.
Security giant RSA has confirmed that hackers leveraged stolen information about its SecurID two-factor authentication offerings in a recent attack on U.S. defense contractor Lockheed Martin.
There remain more questions than answers after defense contractor Lockheed Martin over the weekend disclosed that its systems had been successfully breached.
The major defense contractor Lockheed Martin is experiencing a massive network disruption that may be related to an attack on RSA earlier this year.
Facebook is rolling out two-factor authentication to fight against the possibility of unauthorized account access.
Five days after RSA announced that its systems were breached by a sophisticated attack, details remain scant about how customers of its SecurID two-factor authentication products may be affected.
Enterprises are under constant seige from cyberthreats that continue to evolve to new levels of sophistication, reports Deb Radcliff.
CISOs need to provide safe and efficient means to establish and enforce controls over documents, facilitating collaboration with others beyond the organization.
Sign up to our newsletters
SC Magazine Articles
- New SSL/TLS vulnerability, FREAK, puts secure communications at risk
- Report: Majority of health-related websites leak data to third parties
- Researchers investigate link between Axiom spy group, Anthem breach
- Natural Grocers investigating unauthorized access to POS systems
- Spammers leverage DMARC to more successfully distribute ransomware
- Financial cybercrime landscape changing, experts say
- Google counsel talks privacy, innovation
- Indictment reveals theft of one billion email addresses from ESPs, three charged
- Clinton's use of private email spawns security, transparency debate
- Android 'Gazon' worm proliferates through texts, infects more than 4k phones