Smartphones are key elements of two-factor authentication processes. Weakening their security threatens people's digital identities.
Four important elements to consider when evaluating how safe you are online.
The technologies change, but the challenge remains the same: How can a digital system authenticate an analog human's identity?
A roundup of research into what makes passwords secure, and options for new standards of login authentication.
The first line of cyberdefense is having a good password. What does research say about what that actually means?
People who think like hackers have some really good ideas about how to protect digital privacy during turbulent times. We can learn from them.
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.