Narrative Authentication Builds Storytelling into Logins

Keywords, passphrases, 25-digit alphanumeric codes, picture recognition, biometrics –authentication is a notoriously difficult thing to effect while thwarting hackers the majority of the time, given the boundaries of human memory and the rampant presen…

Read More >>

2014: ‘The Year of Encryption?’

Will 2014 see a big uptick in the use of biometric technologies, strong encryption, a rash of new key technologies and more? Some say that the era of having unencrypted data traffic flowing freely inside enterprises will likely soon come to a crashing …

Read More >>

Yahoo Has Been Serving Malware To Its Users

On Friday 3 January, Dutch security firm Fox-IT detected malicious activity on some of its clients’ networks – with a common factor: they had all previously visited yahoo.com. Further investigation revealed malvertising on the Yahoo site – and it is po…

Read More >>

AutoIT Surges as Malware Component

AutoIT, a flexible coding language that’s been used since 1999 for scripting in Windows, is now cropping up in next-gen malware like a Zeus variant that efficiently steals information from FTP sites and personal certificates.

Read More >>

Dangerous Trojan Targets World of Warcraft

Blizzard, the company behind the popular online multiplayer World of Warcraft game, has warned its gamers that a “dangerous Trojan” called Disker is being used to compromise player’s accounts, even if they are using an authenticator for protection.

Read More >>