Recent news headlines have declared the password dead. But what's slated to replace it? Are all consumers comfortable with the same authentication methods? Different generations aside, one thing's certain: there's got to be a better way.
Before rushing headlong into the Internet of Things, it's good to know what happens to the data that all those connected devices collect--and how to protect it.
Security researchers at the CWI institute in Amsterdam working together with a team from Google found a practical way to compromise the SHA-1 hash algorithm. The goal of this post on ITSPmagazine is to explain the impact of this finding and what can be done to mitigate the risk.
After years of discussion, expectation and experimental products, it looks like the smart home is finally having its moment - particularly with popular adoption of devices like Google Home and Amazon Echo. Of course, these convenient and exciting devices are still new, and that means there are still bugs to work out. Where does this leave us?
Most small businesses think that they can’t or won’t be the victims of cyber attack — that fraudsters and hackers are only interested in going after large corporations. Think again — and consider these 5 best practices when you do.
Malicious actors are wasting no time in kicking off 2017…in the past week we’ve seen an active and growing ransom campaign against over 10,000 unsecured Internet-facing data MongoDB instances. Here expert Jason Garbis explores this situation a bit more, and then takes a step back for some analysis.