One website dedicated to tracking stolen passwords suggests there are details of currently more than 10 billion compromised accounts available online.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they're not all equally protective.
Face to face, virtually.
SammyVision/Moment via Getty Images
Zoom's privacy and security shortcomings are just the latest videoconferencing vulnerabilities. Knowing each platform's risks can help people avoid many of the downsides of virtual gatherings.
Even though passcode options include swipe patterns and long passwords, many users still use easy 4-digit PINs. This is because people are often lulled into a false sense of security when they use fingerprint login.
While the data from a fingerprint is very hard to retrieve, cybercriminals can get around biometric technology in various ways. And having a weak passcode is like giving them a hall pass.
This SDS Sigma 7 computer sent the first message over the predecessor of the internet in 1969.
Andrew 'FastLizard4' Adams/Wikimedia Commons
The first internet communication was underwhelming, thanks to a computer crash. But a lot has happened since then – including key decisions that helped build the internet of today.
More than ten years since blockchains were developed, their usefulness is only just being discovered.
As police face greater obstacles with encryption, courts are divided on whether compelling people to reveal their passwords is legal.
In a recent Canadian court case, defence and prosecution argued over whether a suspect was required to provide his password to allow for a search warrant to be executed on his phone.
Canadian CEO Gerald Cotten died in December, taking to his grave the passwords to unlock his cryptocurrency clients’ millions.
The CEO of a Canadian cryptocurrency company died recently, and took his passwords with him, leaving his clients high and dry. The debacle illustrates again that cryptocurrencies should be regulated.
Many people don’t want to let go of how they create passwords.
When it comes to picking a new password, people's resistance to change can make them less secure online.
Prepare to protect yourself.
Think defensively about your online accounts and data security – and don't assume you'll avoid harm.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
What dangerous experiences lurk behind the use of this trackpad?
Protect yourself from hackers, trolls, bots, social media executives and programmers in need of ethics training.
A test subject entering a brain password.
Wenyao Xu, et al.
Biometrics are more secure than passwords – but when they're compromised fingerprints and retina scans are hard to reset. Brain responses to specific stimuli are as secure and, crucially, resettable.
There are several flow-on effects from the recent Facebook hack.
There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, but they want those same systems to be easily accessible.
How secure is your password?
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
Staying safe online requires more than just a good password.
Four important elements to consider when evaluating how safe you are online.
Scholars have ideas about how to help solve our password problems.
A roundup of research into what makes passwords secure, and options for new standards of login authentication.
Make it longer than 12 characters!
Recent federal changes to password-strength guidelines echo the findings of research we've been doing. It's time to think differently about what makes a password secure.
More power than you think in power walking.
From power walks to silly walks, we can use our movement to generate energy in a way that is unique to everyone. And that can be used to help secure our wearable technology.
What if you could unlock your smartphone this way?
A simple idea that's surprisingly secure: drawing your own unlock pattern on a touchscreen. Faster and easier to remember than a password, and much harder to guess or crack.