Canadian CEO Gerald Cotten died in December, taking to his grave the passwords to unlock his cryptocurrency clients’ millions.
The CEO of a Canadian cryptocurrency company died recently, and took his passwords with him, leaving his clients high and dry. The debacle illustrates again that cryptocurrencies should be regulated.
Many people don’t want to let go of how they create passwords.
When it comes to picking a new password, people's resistance to change can make them less secure online.
Prepare to protect yourself.
Think defensively about your online accounts and data security – and don't assume you'll avoid harm.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
What dangerous experiences lurk behind the use of this trackpad?
Protect yourself from hackers, trolls, bots, social media executives and programmers in need of ethics training.
A test subject entering a brain password.
Wenyao Xu, et al.
Biometrics are more secure than passwords – but when they're compromised fingerprints and retina scans are hard to reset. Brain responses to specific stimuli are as secure and, crucially, resettable.
There are several flow-on effects from the recent Facebook hack.
There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, but they want those same systems to be easily accessible.
How secure is your password?
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
Staying safe online requires more than just a good password.
Four important elements to consider when evaluating how safe you are online.
Scholars have ideas about how to help solve our password problems.
A roundup of research into what makes passwords secure, and options for new standards of login authentication.
Make it longer than 12 characters!
Recent federal changes to password-strength guidelines echo the findings of research we've been doing. It's time to think differently about what makes a password secure.
More power than you think in power walking.
From power walks to silly walks, we can use our movement to generate energy in a way that is unique to everyone. And that can be used to help secure our wearable technology.
What if you could unlock your smartphone this way?
A simple idea that's surprisingly secure: drawing your own unlock pattern on a touchscreen. Faster and easier to remember than a password, and much harder to guess or crack.
An artist’s depiction of the ‘shibboleth incident.’
Detail from art by H. de Blois, from The Bible and Its Story Taught by One Thousand Picture Lessons, vol. 3, edited by Charles F. Horne and Julius A. Bewer, 1908
Going as far back as the Bible, and as widely known as the phrase 'Open, Sesame,' passwords are a textual link to our past. But they may not be around much longer.
‘No, I absolutely do not wish to change my password, thanks.’
If security advice from government agencies doesn't ring true, customers won't take it – which puts us all at risk.
How secure are you?
Rawpixel.com via shutterstock.com
The first line of cyberdefense is having a good password. What does research say about what that actually means?
What if even you didn’t know your own password?
Password via shutterstock.com
As searches of smartphones and other digital devices at US borders become more common, can research and computer science help protect travelers' privacy?
Fatigued via shutterstock.com
Dulled by hearing the same old recommendations to improve internet security, we are worn out. It's time for a new approach, involving us all.
Not this kind of spearfishing – the kind that involves a computer.
Underwater image via shutterstock.com
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
Saying they are is to dangerously misunderstand the limits of scientific enquiry.