Password authentication News
October 11, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the expanding scope of the Equifax and Yahoo breaches and the long-term effects of these major security incidents.
September 01, 2017
There's really nothing new under the sun when it comes to addressing security vulnerabilities in code. While there has been a great shift in terms of how server side application are architected, ...
June 08, 2017
IoT cameras could be fully compromised due to multiple vulnerabilities, including hardcoded passwords that can be used regardless of user settings.
May 13, 2017
The involvement of GCHQ in the NHS ransomware incidence marks a turning point in the first against cybercrime
Password authentication Get Started
Bring yourself up to speed with our introductory content
Mobile biometric authentication sounds like a mouthful, but in reality, it's easy to break down. Don't be afraid to get up close with this essential mobile security software. Continue Reading
Biometrics and behavioral analysis is taking hold as security pros search for authentication tools to thwart increasingly aggressive and innovative hacking attacks. Continue Reading
Biometric authentication methods, like voice, fingerprint and facial recognition systems, may be the best replacement for passwords in user identity and access management. Continue Reading
Evaluate Password authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Jason Hong talks about Carnegie Mellon's work in social cybersecurity, a new discipline that uses techniques from social psychology to improve our ability to be secure online. Continue Reading
The Microsoft Authenticator application enables smartphone-based, two-factor authentication and attempts to reduce the use of passwords. Expert Matthew Pascucci explains how. Continue Reading
Facebook's Delegated Recovery aims to replace knowledge-based authentication with third-party account verification. Expert Michael Cobb explains how this protocol works. Continue Reading
Manage Password authentication
Learn to apply best practices and optimize your operations.
Can two-factor authentication be applied to a mobile device that's used as a 2FA factor? Michael Cobb explores the different knowledge factors and uses for mobile devices. Continue Reading
Public hotspot security needs to be carefully considered by IT departments and traveling professionals to prevent breaches of sensitive corporate data. Continue Reading
When an IT incident arises, the focus is often on what admins can fix in the moment, but unflappable organizations make process improvement the final step of issue resolution. Continue Reading
Problem Solve Password authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A verification flaw in the synchronization service of iCloud Keychain enables attackers to intercept the data it transfers. Expert Frank Siemons explains what to do about it. Continue Reading
Here are some strategies to remove plain text passwords from configuration files and your code base. It's one way a secure Java app can deter a malicious attack. Continue Reading
Cached credentials make users' lives easier, but they can be a security issue in Windows if a device falls into the wrong hands. IT can manage them on a large scale with PowerShell. Continue Reading