In what is colourfully termed a ‘brute force’ attack, hackers use bots to test millions of username and password combinations on different websites – until they find a match.
Companies tend to focus on appeasing angry customers after a data breach. New research shows they may want to pay more attention to customers who are afraid to return to their site.
Passwords are both annoying to use and vulnerable to hackers. Google is moving to support stronger, easier-to-use passkeys (and other tech companies are close behind).
Start 2022 by improving your password hygiene. Ideally you can use a password manager, but at the very least make sure your financial, social and work accounts each has their own strong, unique login.
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.
Zoom’s privacy and security shortcomings are just the latest videoconferencing vulnerabilities. Knowing each platform’s risks can help people avoid many of the downsides of virtual gatherings.
While the data from a fingerprint is very hard to retrieve, cybercriminals can get around biometric technology in various ways. And having a weak passcode is like giving them a hall pass.
The first internet communication was underwhelming, thanks to a computer crash. But a lot has happened since then – including key decisions that helped build the internet of today.
In a recent Canadian court case, defence and prosecution argued over whether a suspect was required to provide his password to allow for a search warrant to be executed on his phone.
The CEO of a Canadian cryptocurrency company died recently, and took his passwords with him, leaving his clients high and dry. The debacle illustrates again that cryptocurrencies should be regulated.