Apple has announced an event for October 22, with the usual teasing headline, “We still have a lot to cover.” Leaked pictures hint that at least one of those things will be an iPad protected by the Fingerprint ID system used in iPhone 5S.
For many PC users USB keys must seem like a relic of a bygone age – but for security-conscious workers, keys can be a very safe place for data. Porsche and Lacie’s new USB offers password-protected storage for sensitive files.
Smartphone users want more protection for the data on their cellphone – and are perfectly comfortable being fingerprinted if that’s the best option, accoriding to a new survey commissioned by PayPal.
Apple’s fingerprint sensor has drawn a huge amount of attention (and hack attempts) ever since it launched on iPhone 5S – but it seems Android users will get their own fingerprint protection shortly.
The human voice can be used as a secure, quick way to identify people, claims Bretislav Beranek of voice-recognition software company Nuance. Beranek claims that voice ID is gaining ground – and could even be used to authenticate users for credit cards.
Logging into public Wi-Fi hotspots can be risky, particularly for business users with sensitive data on their devices – but a new breed of hi-tech hotspots may make things safer, the Wi-Fi Alliance claims.
An Israeli security researcher has found another way round Apple’s Fingerprint ID security system – this time via a two-step lock-screen glitch which works with the new iOS update 7.0.2.
One day, your smartphone might “recognise” you by the way you walk, the way your fingers tap on a touchscreen – or even simply where you go during the day. Habits such as your walk can be as distinctive as a fingerprint, researchers claim.
Android users will now be able to remotely add a password to a lost device, even if it’s locked, or already being used. Android police describe the new feature as “incredibly robust.”
Germany’s Chaos Computer Club released a video showing how a “fake fingerprint” made from latex could be used to fool the sensor, allowing any attacker access to the handset.
A brainwave scanner could be used as the ultimate biometric “car key” according to researchers at Tottori University – and even prevent carjackings, drunk driving, or accidents caused by drivers falling asleep.
A breach which has leaked personal data for two million Vodafone Germany customers has ben claimed to be the work of an insider, according to Vodafone.
“Passwords are done at Google,” said Heather Adkins, Google’s information security chief – and said that “the game is over” for start-ups relying on passwords as the chief method to keep users secure.
Apple introduced biometric security to iPhone for the first time with the launch of its new iPhone 5S, featuring what Apple describes as an “intelligent” and “accurate” laser fingerprint sensor.
Simply holding your phone a few inches from your PC to “hear” signals inaudible to humans will be enough to log in to sites and services previously protected by cumbersome two-factor systems, a new start-up claims.
When Apple unveils its new iPhone models Tuesday, one particularly persistent rumor may come true – that at least one model of the new hardware will feature a built-in fingerprint scanner.
Four out of five consumers have been “locked out” of websites due to not remembering log-ins – and over a fifth rely on password resets “on a regular basis,” according to a survey conducted by Ping Identity.
Your unique heartbeat could offer a secure and easy-to-use alternative to remembering dozens of long, complex passwords, according to Bionym, who launched a new “password wristband” today.
Four out of ten employees who use their own mobile devices at work fail to use basic security measures – and the trend for “BYOD” could be putting company information at risk, according to a new survey.
The “picture passwords” used in Windows 8 machines are more vulnerable than Microsoft hoped, a research team claims. An analysis of more than 10,000 picture passwords found that a significant percentage could be cracked by algorithms.