Twitter has warned media companies that attacks on their official Twitter accounts are liable to continue, after Britain’s Guardian newspaper became the latest high-profile news site to fall victim.
Daily deals site LivingSocial has become the latest high-profile site to fall victim to hackers, after an attack accessed information for 50 million accounts last week.
Twitter is said to be testing new security systems in the wake of a false Tweet from an official Associated Press account which sent stock markets tumbling in America.
Most cyber attacks are simple and predictable, relying on basic tactics and preventable employee errors, according to Verizon’s annual Data Breach Investigations Report. The problem is made worse by the fact that companies often take months or even years to detect such breaches.
The biggest cyber security problem large companies face could be employees – a survey reveals that nine out of ten employees knowingly ignore or violate their company’s data policies.
The idea that we might ‘think’ passwords instead of typing them sounds like science fiction – but a team of UC Berkeley School of Information researchers has proved that it can work, using existing ‘mind reading’ headsets.
Up to 81% of computer security professionals reuse passwords across multiple applications, violating security best practice
PayPal has warned of a looming security crisis if new top-level domains such as .bank are brought into use later this year.
Most security professionals have enough to deal with thanks to insecure passwords – but AT&T seems to want its users to keep them clean, too. The “password restrictions” page for AT&T users says, “The password can’t contain the words “password”, “admin”, “pa$$w0rd” or other common words. The password can’t contain obscene language.”
Britain’s hi-tech government intelligence agency GCHQ should know better than to send passwords in plain text via email – but has been doing so due to “legacy systems”, it admitted in a statement this week.
Stepping up protection of the Apple ID falters as password reset bug emerges before two-step verification is fully implemented.
Correct identification of an individual using a computer or service is important because it represents the accountability of the person identified. If you know my username on a computer system, you can check on what I do on that system through an audit trail, and I can therefore be held accountable for those actions. However,
Following the examples of Google, Facebook, Yahoo and DropBox, Twitter is reportedly ready to roll out a two factor sign in process for its millions of users. This comes in light of February’s attack when some 250,000 passwords were stolen.
In his summary of New Year predictions by security researchers here at ESET, Stephen Cobb pointed to expanded efforts by malware authors to target the Linux operating system. Looks like that might be right: A blog post published by Sucuri yesterday describes a backdoored version of the SSH daemon discovered on compromised servers. Interestingly, this
According to the Deloitte Technology Trends 2013 report more than 90 per cent of user-generated passwords are weak and vulnerable to hacking, including those considered strong by IT departments.
[UPDATE #1: (21 Dec 2012, 5:30PM) ESET Researcher Cameron Camp has just published the second part of this series on securing your Android device. Read it here on the ESET Threat Blog at Securing Your Holiday Tech Gifts, Part 2: Android Guide. AG] December is upon us, and whether you have a Christmas tree, menorah,
Online passwords are a pain, and not just when you have to type them to access your online bank account or shop at your favorite digital emporium. Password pain extends to the people who have to manage them. A few weeks ago we shared some initial findings from a recent poll of 2,129 U.S. adults
Are younger people less aware of online security risks, or do they simply prefer to take more risks with their personal information? That’s one of the questions raised by the findings of our recent poll of 2,129 U.S. adults (aged 18 and over) by Harris Interactive.
Phish, Phowl, and Passwords I spend a lot of time defending educational as opposed to purely technical solutions to security. Not that I don’t believe in the usefulness of technical solutions: that is, after all, ESET’s basic business. However, there are many people in the security business who believe that education is a waste of