An Australian company that issues identity cards for access to airports has been notifying applicants and cardholders that their personal information may have been compromised, according to a news report. Australian federal police are investigating.
Timehop, an application that revives older social media posts, says the lack of multifactor authentication on a cloud services account led to a data breach affecting 21 million users. The breach exposed names, email addresses, phone numbers and access tokens Timehop used to read information from accounts.
Adaptive authentication is a new approach to combatting fraud that achieves the twin goals of reducing fraud risk and preserving the customer experience.
Download this white paper and learn:
The characteristics and advantages of adaptive authentication;
How behavioral biometrics and mobile apps both play...
In June, Maryland authorities used facial recognition capabilities to comb through 10 million images and identify Jarrod Ramos, the suspect in the Capital Gazette shooting, which left five people dead. One public safety official described the technology as "a valuable tool for fighting crime."
But what are the...
What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.
Consumers are more concerned than ever about their identities being compromised, yet they're failing to connect the dots between fear and preventive measures, according to recent research conducted by IDology. John Dancu, the company's CEO, explains the implications for businesses.
For attackers, "credential stuffing" - using stolen usernames and passwords to log into any site for which a user reused their credentials - is the gift that keeps on giving, says security researcher Troy Hunt. Here's how organizations can mitigate the threat.
Business cases for fraud prevention technologies have typically been based on savings related to fraud management and compliance costs. While these factors may remain of interest, the impact on the customer experience and related operational costs must take precedence.
Download this white paper and learn how to...
Leading the latest edition of the ISMG Security Report: An analysis of how distraction tactics were used during a $10 million SWIFT-related hack at Banco de Chile. Also, a wrapup of Infosecurity Europe.
Forrester recently surveyed 100 IT and IT security executives to understand the approaches and challenges your peers experience with user authentication and access management.
Curious to hear how you compare to your peers? Read the Forrester Report.
The geneology service MyHeritage says a security researcher found 92 million email addresses and hashed passwords for its users on a private external server. The company, however, says there's no evidence of abnormal account activity or indications family trees or DNA results were affected.
For at least the third time in recent months, a mobile fitness app maker apparently has exposed consumers' sensitive personal information. The latest app to expose data: PumpUp.
You know that your organisation is using SSH to safeguard privileged access, but you may not realize that your SSH keys could be vulnerable to insider and cyber threats.
The majority of those we surveyed didn't. Results from a recent study show that most organisations don't have the SSH visibility or security...
Data encryption, advanced authentication, digital signing and other cryptography-based security functions have come to play a vital role in organisations' cybersecurity and regulatory compliance initiatives throughout the UK and EU.
To secure their digital assets effectively, organisations must protect their...
Payments are getting faster, and so is payments fraud. A robust fraud management strategy focusing on strong authentication, customer education and scalable responses can be instrumental in minimizing payment fraud risk.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.