Результатов: 303

New WISeKey Blockchain Center of Excellence in Geneva to Focus on Root of Trust Tool and DLT Research

WISeKey is a platform that offers support for secure authentication and identification, which is performed with the use of the Root of Trust, a cryptographic tool from the same platform. Their operations and portfolio of work often involve the use of Internet of Things (IoT) and blockchain technology. According to an annoucement on the official […] дальше »

2019-2-2 21:29


New Mac Malware Can Steal Crypto from Exchanges, Can it be Prevented?

Unit 42, the global threat intelligence team at Palo Alto Network, discovered Mac malware that can steal cookies linked to crypto exchanges and wallets. Although usernames and passwords may not be sufficient to initiate withdrawals at crypto exchanges, if hackers manage to steal a combination of login credentials, web cookies, authentication cookies, and SMS data, it could steal user funds. дальше »

2019-2-2 21:32


LocalBitcoins Users Scammed of Bitcoin in Phishing Attack, Forum Suspended

Users of the peer-to-peer OTC Bitcoin trading service LocalBitcoins have been targeted by cyber criminals as part of a phishing scam, resulting in the user’s Bitcoin being stolen. Forum users were being redirected to a phishing site, which was prompting the users to input two-factor authentication codes that were used to access user accounts and empty. дальше »

2019-1-26 16:37


Luxochain Blockchain Service’s Block ID Uses NFC, RFID And FPA To Track And Verify Luxury Goods

Luxochain Has Just Launched An Authentication And Tracking Service That Can Be Used For Luxury Goods On The Blockchain Technology A blockchain based service referred to as the Luxochain, one that has been able to combine Radio Frequency Identification (RFID), Near Field Communication (NFC) and the Fingerprint Authentication (FPA) has just gone ahead to announce their […] дальше »

2019-1-24 00:23


Grabity ICO

"Grabity provides an innovative Blockchain platform for global ecosystem and Blockchain users. " Grabity’s platform allows to solve the limitation in the speed of authentication and the size of the distributed storage accumulated in each node increasing equally, thus reducing the efficiency of the entire network and reducing node scalability, through Orbital Consensus and Genesis Hoisting. дальше »

2018-12-22 12:33


Фото:

This is the future of authentication, according to security experts

Passwords may not have been much of an annoyance back in the 1960s, when they were first believed to have been introduced to the world of computing. But as we’ve increasingly adopted a wide range of personal gadgets and online services, they’ve become a pain to manage, and a point of vulnerability that hackers can exploit when conditions are in their favor. дальше »

2018-12-19 12:00


Фото:

Researchers show how data science techniques can find Twitter ‘amplification bots’

Researchers from Duo Security, an authentication services company owned by Cisco Systems, have published a blog post that explains how to methodically identify “amplification bots. ” These are defined as automated Twitter accounts that purely exist to artificially amplify the reach of content through retweets and likes. дальше »

2018-12-11 17:00


Фото:

This company promises to recover files from your locked iPhone – but it won’t help the FBI

DriveSavers, a company known for its data recovery services, announced that it can offer “passcode lockout recovery service,” which means it can unlock your secured iPhone. That’s notable because it’s damn near impossible to unlock an iOS device without the passcode or access to the owners’ biometric signatures for authentication. дальше »

2018-11-28 16:50


Фото:

2FA codes are great for security, except when 26M of them are leaked

Just when you thought two-factor authentication was enough to secure your online accounts, a troubling discovery shows how this system can be comprised, thanks to human error. TechCrunch reports that a database of text messages containing more than 26 million 2FA codes, password reset links, and delivery tracking details was left out in the open … This story continues at The Next Web дальше »

2018-11-16 13:22


Фото:

Researchers create ‘master key’ fingerprints that can fool biometric databases

Researchers from New York University have created a set of master fingerprint keys that can be used to spoof biometric identification systems. While the database of fingerprints used by the researchers had a chance of falsely matching with a random fingerprint one out of 1000 times, the master prints they generated had the power to falsely match one out of five times. дальше »

2018-11-15 22:57


Фото:

Wall Street Learns to Hodl

After ten years of watching from the sidelines, Wall Street is dipping more toes into the crypto world. Bank of America is the latest legacy financial institution to test the waters. On Tuesday the bank was awarded a patent for “systems and devices for hardened remote storage of private cryptographic keys used for authentication” in […] The post Wall Street Learns to Hodl appeared first on Crypto Briefing. дальше »

2018-10-31 19:48


Фото:

REMME Is on Track to Deliver a Password-less Future with Blockchain

With billions of people and devices connected to the internet at any given point of time, online security has perhaps never been this crucial. Despite all the vulnerabilities the approach implies, sensitive data – including personal identities and financial records – is still stored on centralized servers accessible via password authentication. дальше »

2018-10-28 18:00