The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus

Categories

WEDNESDAY, MAY 25, 2016

Featured

Archives

Latest Comments

Social Networks

The simplest way to describe homomorphic encryption would be the following: HE is the particular type of converting data into cipher text that allows this encrypted data to further get analyzed, permuted, associated to, and generally used into various computations without any decryption involved. The denomination comes from Greek and it means “same structure”, in […]

Read more ...

A private industry notification issued by the FBI in late April may indicate that keyloggers disguised as USB device chargers have been fund being used in the wild. The notification does not say when or where the devices have been spotted, just that “the information in this notification was obtained through an FBI investigation.” The […]

Read more ...

The information security team is often seen as the department of “No.” At best, it’s viewed as the department that impacts productivity and drives down employee satisfaction. Take the simple task of an employee getting access to business resources to do his or her job. One of a few scenarios takes place: Read More

Read more ...

With password managers to take care of ch00sing c0MPl1c/tEd p455WOrdz for us, and with two-factor authentication (2FA) to reduce the value of stolen or poorly-chosen passwords, you could argue that we no longer need to supplant passwords, because they’re easier than ever to use securely. Password managers not only happily use passwords like [email protected], where […]

Read more ...