Cryptography is a vital part of cybersecurity. Security properties like confidentiality, integrity, authentication, non-repudiation rely on strong cryptographic mechanisms, especially in an always connected, always online...
In this article, we discuss how two-factor authentication has been evolved to address the shortcoming of single authentication systems. We also discuss how we can utilize...
Enterprises worldwide are accelerating the adoption of passwordless authentication technologies in response to the increase in cybersecurity threats in 2020, according to a new report released...
With quantum computing looming on the horizon, Cloudflare says it has been trialing the KEMTLS protocol and plans to use post-quantum cryptography for most internal services by...
Threat levels have ratcheted up a notch about miscreants who posted an exploit that targets a security vulnerability in SAP’s enterprise software. The functional exploit goes...
A new side-channel attack exploiting a vulnerability in NXP chipsets can be used to clone Google Titan Security Keys. On January 7, Ninjalab’s Victor Lomné and...
UPDATED GitLab installations need to be updated following the discovery of a set of security vulnerabilities, including a critical access token theft issue. First up, insufficient validation...
QR codes have a variety of uses, from storing bank information for payments to ordering at restaurants or joining a WiFi network. But the easy-to-use codes...
As organizations continue to adapt to life in the age of COVID-19, smartphones are set to take on additional responsibilities – even as the security limitations...
Identity access management provider SecureAuth has uncovered a security vulnerability in SAP HANA, SAP’s in-memory database. HANA is a core component of SAP’s business technology platform...
Recent Comments