Authentication
Password breach teaches Reddit that, yes, phone-based 2FA is that bad
Attackers steal password data, user messages, email addresses, and more.<p>A newly disclosed breach that stole password data and private messages is …
IT securityReddit data breach exposes the login credentials of accounts created in 2007
Security and data breaches have pretty much become the norm for tech companies as of late. There was the Equifax breach last year, the Timehop breach …
Security63% of companies say employees won't use multi-factor authentication
While cybersecurity breaches are still rampant in the tech industry, many employees are hesitant to take the necessary precautions.<p>The majority of …
SecurityMicrosoft ups security for Edge browser
In an effort to improve security and make signing into websites easier for Edge users, Microsoft has announced support for the Web Authentication …
Windows 10Iowa Health Group Data Breach Hits 1.4 Million Patients
UnityPoint Health Says Hackers' Likely Goal Was Business Email Compromise Fraud Jeremy Kirk (jeremy_kirk) July 31, 2018<p>A large Midwestern health …
CybersecurityG Suite can now alert admins of accounts targeted by government-based attackers
Since 2012, Google has warned users being targeted by what the company suspects are government-based attackers. Coinciding with today’s climate, Google is now adding a feature to alert G Suite administrators when there has been such an attempt on an account they manage.<p>An alert is sent when Google …
Personal InformationReddit Suffers 'Serious' Security Breach
Reddit was victim of a serious hack that has compromised the security of some of its users’ data, the social network announced Wednesday.<p>In a …
SecurityGoogle wants back into China — and will censor search results to get there
Google has been secretly developing a search app for the Chinese market that will filter out results related to human rights, democracy, religion and peaceful protest, VICE News confirmed Wednesday.<p>Google’s intentions were first reported by the Intercept, after a whistleblower leaked secret …
ChinaHP launches flexible systems to enhance in-store retail
Retailing presents some unique challenges for IT. Endpoints tend to be in fixed positions which has an effect on how staff interact with customers.<p>HP …
Customer ExperienceIndia among top-10 victims in SamSam ransomware attack
India seems to have emerged as an attractive target for hackers. It emerged as a top victim in the SamSam ransomware attack that was first reported …
CybersecurityReddit Hack Exposes Old Private Messages, Says CTO
Critical data from between 2005 and 2007 was accessed.<p>Reddit histories are often used to out people for unsavory public statements buried in the …
InternetGitHub announces new account security and recovery practices
GitHub wants to improve security with new capabilities and best practices for account security and recoverability.<p>The company announced it will be …
SecurityThe interim head of UMD’s IT division will take over the position full-time
The University of Maryland announced Wednesday that interim vice president and chief information officer Jeff Hollingsworth will take over the …
ITUse private docker registry with Authentication in Jenkinsfile
<b>How can I teach my Jenkisfile to login via basic auth in this setup?</b><p>I'm using a custom docker image for my Jenkins build. As described in the …
MicroservicesSymfony 3 with GraphQL: authentication
I'm using Symfony 3 with youshido/graphql-bundle and FOSUserBundle. I'm beginning to work on the authentication part of the API and I don't know how …
Software EngineeringNo Payments Service Till Office is Set Up: Govt to WhatsApp
The Indian government has told WhatsApp that it cannot set up its payments service in India till the time it has an office and has recruited a team …
IndiaCelebrating Istio service mesh project at 1.0 and what it means for the Kubernetes community
Today we are excited to share with the community that Istio has achieved the milestone of hitting 1.0. In 2016 work began on Istio to provide an …
DevOpsA 20-year-old college student hacked 40 phones and stole $5 million
<b>In brief:</b> A 20-year-old college student has been arrested and charged with hijacking more than 40 phones and stealing $5 million in cryptocurrencies. …
Social IssuesYale Discloses Data Breach
7/31/2018<br>12:00 PM<p>50%<p>50%<p>The university discloses that someone stole personal information a long time ago.<p>Yale University has just disclosed that it …
Information SecurityMarketers, Authentication Is Now Our Responsibility: Are You Ready?
Digital marketing has never been more sophisticated or successful. To all the CMOs, strategists and designers who do the hard work that increases sales: Great job! Now comes the responsibility of ensuring those new customers don’t rob your company.<p>As head of global marketing at a fraud prevention …
MarketingSamSam Ransomware Attacks Extorted Nearly $6 Million
Ransomware has become a multimillion-dollar black market business for cybercriminals, and SamSam being a great example. New research revealed that …
RansomwareOffice 365 email attacks continue relentless rise
New York, July 31, 2018 (GLOBE NEWSWIRE) -- Attacks targeting business email accounts continued to climb in the second quarter, according to data …
CybersecuritySaaS Information Security Checklist. Protect your product and user data
Security issues in cloud computing have become critical with the growing demand for SaaS products. According to Forrester, outside attacks, human …
Project ManagementTraveling The World With Crypto? Ten Tips To Keep You Safe
Thanks to the internet and the subsequent rise of cryptocurrencies, we are living in an increasingly borderless world. Digital nomads bounce from country to country and some intrepid travelers have started using bitcoin or ethereum in order to have more control over their financial accounts.<p>But as …
CryptocurrencyMicrosoft Edge Getting Advanced Web Authentication Support
Microsoft was the first to ship support for Web Authentication preview in Microsoft Edge back in 2016. Web Authentication allows for a password-free …
Windows 10How to Authenticate Users into Your Apps Using Application Load Balancer and Centrify | Amazon Web Services
<i>By Stas Neyman, Sr. Product Marketing Manager at Centrify</i><p>At <b>Centrify</b>, an AWS Partner Network (APN) Advanced Technology Partner, we frequently work …
Cloud ComputingGoogle launches Titan security key to make two-way authentication simpler- Technology News, Firstpost
Google recently announced a new product at the Next conference, called the Titan security key, meant to authenticate logins over Bluetooth and …
Technology (India)Aadhaar privacy issues extend beyond the security of its biometric database- Technology News, Firstpost
The weekend saw a sharp exchange of tweets between our soon-to-retire telecom regulatory chief Mr R.S. Sharma and advocates of privacy. He is an …
Technology (India)McCaskill Staff Dodges Hack but Hill Security Still Lags
Staff thwarted the hack, but training isn’t mandatory<p>When Russian hackers targeted Sen. Claire McCaskill’s office, staffers did not take the …
PoliticsDraft Policy Suggests E-Commerce, Technology Companies Should Store Data Locally
India is considering a policy that may force e-commerce companies such as Flipkart India Pvt. Ltd. and Amazon.com Inc., social media websites like …
eCommerce