Authentication

Password breach teaches Reddit that, yes, phone-based 2FA is that bad

Attackers steal password data, user messages, email addresses, and more.<p>A newly disclosed breach that stole password data and private messages is …

IT security

Reddit data breach exposes the login credentials of accounts created in 2007

Security and data breaches have pretty much become the norm for tech companies as of late. There was the Equifax breach last year, the Timehop breach …

Security

63% of companies say employees won't use multi-factor authentication

While cybersecurity breaches are still rampant in the tech industry, many employees are hesitant to take the necessary precautions.<p>The majority of …

Security

Microsoft ups security for Edge browser

In an effort to improve security and make signing into websites easier for Edge users, Microsoft has announced support for the Web Authentication …

Windows 10

Iowa Health Group Data Breach Hits 1.4 Million Patients

UnityPoint Health Says Hackers' Likely Goal Was Business Email Compromise Fraud Jeremy Kirk (jeremy_kirk) • July 31, 2018<p>A large Midwestern health …

Cybersecurity

G Suite can now alert admins of accounts targeted by government-based attackers

Since 2012, Google has warned users being targeted by what the company suspects are government-based attackers. Coinciding with today’s climate, Google is now adding a feature to alert G Suite administrators when there has been such an attempt on an account they manage.<p>An alert is sent when Google …

Personal Information

Reddit Suffers 'Serious' Security Breach

Reddit was victim of a serious hack that has compromised the security of some of its users’ data, the social network announced Wednesday.<p>In a …

Security

Google wants back into China — and will censor search results to get there

Google has been secretly developing a search app for the Chinese market that will filter out results related to human rights, democracy, religion and peaceful protest, VICE News confirmed Wednesday.<p>Google’s intentions were first reported by the Intercept, after a whistleblower leaked secret …

China

HP launches flexible systems to enhance in-store retail

Retailing presents some unique challenges for IT. Endpoints tend to be in fixed positions which has an effect on how staff interact with customers.<p>HP …

Customer Experience

India among top-10 victims in SamSam ransomware attack

India seems to have emerged as an attractive target for hackers. It emerged as a top victim in the SamSam ransomware attack that was first reported …

Cybersecurity

Reddit Hack Exposes Old Private Messages, Says CTO

Critical data from between 2005 and 2007 was accessed.<p>Reddit histories are often used to out people for unsavory public statements buried in the …

Internet

GitHub announces new account security and recovery practices

GitHub wants to improve security with new capabilities and best practices for account security and recoverability.<p>The company announced it will be …

Security

The interim head of UMD’s IT division will take over the position full-time

The University of Maryland announced Wednesday that interim vice president and chief information officer Jeff Hollingsworth will take over the …

IT

Use private docker registry with Authentication in Jenkinsfile

<b>How can I teach my Jenkisfile to login via basic auth in this setup?</b><p>I'm using a custom docker image for my Jenkins build. As described in the …

Microservices

Symfony 3 with GraphQL: authentication

I'm using Symfony 3 with youshido/graphql-bundle and FOSUserBundle. I'm beginning to work on the authentication part of the API and I don't know how …

Software Engineering

No Payments Service Till Office is Set Up: Govt to WhatsApp

The Indian government has told WhatsApp that it cannot set up its payments service in India till the time it has an office and has recruited a team …

India

Celebrating Istio service mesh project at 1.0 and what it means for the Kubernetes community

Today we are excited to share with the community that Istio has achieved the milestone of hitting 1.0. In 2016 work began on Istio to provide an …

DevOps

A 20-year-old college student hacked 40 phones and stole $5 million

<b>In brief:</b> A 20-year-old college student has been arrested and charged with hijacking more than 40 phones and stealing $5 million in cryptocurrencies. …

Social Issues

Yale Discloses Data Breach

7/31/2018<br>12:00 PM<p>50%<p>50%<p>The university discloses that someone stole personal information a long time ago.<p>Yale University has just disclosed that it …

Information Security

Marketers, Authentication Is Now Our Responsibility: Are You Ready?

Digital marketing has never been more sophisticated or successful. To all the CMOs, strategists and designers who do the hard work that increases sales: Great job! Now comes the responsibility of ensuring those new customers don’t rob your company.<p>As head of global marketing at a fraud prevention …

Marketing

SamSam Ransomware Attacks Extorted Nearly $6 Million

Ransomware has become a multimillion-dollar black market business for cybercriminals, and SamSam being a great example. New research revealed that …

Ransomware

Office 365 email attacks continue relentless rise

New York, July 31, 2018 (GLOBE NEWSWIRE) -- Attacks targeting business email accounts continued to climb in the second quarter, according to data …

Cybersecurity

SaaS Information Security Checklist. Protect your product and user data

Security issues in cloud computing have become critical with the growing demand for SaaS products. According to Forrester, outside attacks, human …

Project Management

Traveling The World With Crypto? Ten Tips To Keep You Safe

Thanks to the internet and the subsequent rise of cryptocurrencies, we are living in an increasingly borderless world. Digital nomads bounce from country to country and some intrepid travelers have started using bitcoin or ethereum in order to have more control over their financial accounts.<p>But as …

Cryptocurrency

Microsoft Edge Getting Advanced Web Authentication Support

Microsoft was the first to ship support for Web Authentication preview in Microsoft Edge back in 2016. Web Authentication allows for a password-free …

Windows 10

How to Authenticate Users into Your Apps Using Application Load Balancer and Centrify | Amazon Web Services

<i>By Stas Neyman, Sr. Product Marketing Manager at Centrify</i><p>At <b>Centrify</b>, an AWS Partner Network (APN) Advanced Technology Partner, we frequently work …

Cloud Computing

Google launches Titan security key to make two-way authentication simpler- Technology News, Firstpost

Google recently announced a new product at the Next conference, called the Titan security key, meant to authenticate logins over Bluetooth and …

Technology (India)

Aadhaar privacy issues extend beyond the security of its biometric database- Technology News, Firstpost

The weekend saw a sharp exchange of tweets between our soon-to-retire telecom regulatory chief Mr R.S. Sharma and advocates of privacy. He is an …

Technology (India)

McCaskill Staff Dodges Hack but Hill Security Still Lags

Staff thwarted the hack, but training isn’t mandatory<p>When Russian hackers targeted Sen. Claire McCaskill’s office, staffers did not take the …

Politics

Draft Policy Suggests E-Commerce, Technology Companies Should Store Data Locally

India is considering a policy that may force e-commerce companies such as Flipkart India Pvt. Ltd. and Amazon.com Inc., social media websites like …

eCommerce