Debunking the myth of password security

When U.S. presidential hopeful Hillary Clinton was found to have used a private email server for government business as Secretary of State, there was a collective gasp of disbelief. That disbelief quickly turned into horror ...

App data vulnerability threatens millions of users

Researchers of the Technische Universität Darmstadt and Fraunhofer SIT have investigated Cloud databases and established: developers wrongly use authentications for cloud services thereby threatening millions of user accounts ...

Eye-tracking could outshine passwords if made user-friendly

(Phys.org) —It's a wonder we still put up with passwords. We forget our highly secretive combinations, so we frequently have them reset and sent to our cellphones and alternative email addresses. We come up with clever ...

Google has ideas for funny-face device authentication

(Phys.org) —Google this year has made it clear that it wants to see a different computer using landscape with techniques that are easier, more reliable than hand-typed passwords for user authentication. Speaking at a security ...

Individual typing style gives key to user authentication

Your typing style is as individual as your fingerprints. Being able to use typing style to identify a change in users could be a vital security and forensic support for organisations such as banks, the military and universities, ...

China censors web after tax riots

China on Friday blocked online access to news of riots by thousands of people who clashed with police in an eastern manufacturing city in what began as a protest over taxes.