Skip to main content

Home/ Digit_al Society/ Group items tagged password

Rss Feed Group items tagged

dr tech

PIN-punching $200 robot can brute force every Android numeric screen-password in 19 hou... - 0 views

  •  
    Justin Engler and Paul Vines will demo a robot called the Robotic Reconfigurable Button Basher (R2B2) at Defcon; it can work its way through every numeric screen-lock Android password in 19 hours.
anonymous

Finding passwords saved in Chrome is surprisingly easy, Google security lead sees no issue - 0 views

  • Finding passwords saved in Chrome is surprisingly easy, Google security lead sees no issue
dr tech

Hacker Claims 7 Million Dropbox Accounts Compromised, Dropbox Denies Hack - 0 views

  •  
    "Dropbox is at the centre of a leak scandal, following the releasing of 400 usernames and passwords by an anonymous user on Pastebin. The hacker claims the initial dump is just a portion of the 6,937,081 Dropbox accounts he claims to have compromised on Tuesday. He then requested Bitcoins in payment before he would allow access to more accounts."
dr tech

Did your Adobe password leak? Now you and 150m others can check | Technology | theguard... - 0 views

  •  
    "Nearly 150 million people have been affected by a loss of customer data by Adobe, over 20 times more than the company admitted in its initial statement last week."
dr tech

The Glass Room - 0 views

  •  
    "And if your password can be reverse-engineered to reveal something about you or others like you, how safe or unique is it really."
dr tech

Deloitte hit by cyber-attack revealing clients' secret emails | Business | The Guardian - 0 views

  •  
    "The hacker compromised the firm's global email server through an "administrator's account" that, in theory, gave them privileged, unrestricted "access to all areas". The account required only a single password and did not have "two-step" verification, sources said."
dr tech

T2 security chip on Macs can be hacked to plant malware - 9to5Mac - 0 views

  •  
    "TL;DR: all recent macOS devices are no longer safe to use if left alone, even if you have them powered down. The root of trust on macOS is inherently broken They can bruteforce your FileVault2 volume password They can alter your macOS installation They can load arbitrary kernel extensions"
dr tech

How India is bringing digital payments to its billion people without smartphones - 0 views

  •  
    "IDFC Bank has launched an app called Aadhaar Pay that aims to help millions of its citizens without a smartphone to pay for their purchases digitally with just their fingerprint.  Merchants will be able to download the app on their Android smartphones and attach a fingerprint scanner device. To make payments, buyers will only have to choose their bank name, input their unique Aadhaar number and scan their fingerprint, which acts as a password to make the payment directly from their bank account linked to their Aadhaar card."
dr tech

6 Reasons Why Biometrics Are NOT the Way of the Future - 0 views

  •  
    "While biometrics may not be the long term alternative to passwords, they are safer to use. Rather than seeing them as separate methods to identify that you are who you say you are, they should instead be viewed as complementary methods that can be used together to verify an individual."
dr tech

Your smartwatch is also recording your PIN - 0 views

  •  
    "With all the personal data it collects, your wrist-mounted wearable computer is almost definitely going to betray you at some point, whether that's a reminder to get up and do another 5,000 steps this afternoon or accidentally giving away your ATM PIN. According to a new paper, ominously titled "Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN" it is surprisingly simple to determine your PIN or password by reverse-engineering motion sensor data from a smartwatch or fitness tracker."
dr tech

Security Expert Bruce Schneier On Passwords, Privacy and Trust - 0 views

  •  
    "They aren't limited by human notions of attention; they can watch everyone at the same time. So while it may be true that using encryption is something the NSA takes special note of, not using it doesn't mean you'll be noticed less. The best defense is to use secure services, even if it might be a red flag. Think of it this way: you're providing cover for those who need encryption to stay alive."
dr tech

Heartbleed - What Can You Do To Stay Safe? - 0 views

  •  
    "Naturally, you should do this - but be aware that this situation presents an ideal opportunity to phishers to start sending fake emails, complete with embedded links to the "change password" page - in reality, a website designed to harvest your details."
dr tech

How Much Does Google Really Know About You? - 0 views

  •  
    "Taken as a whole, the information Google collects about users is shockingly complete. The company can mine your emails and Drive documents, track your browsing history, track the videos you watch on YouTube, obtain your WiFi passwords and much more."
dr tech

Hundreds of US police forces have distributed malware as "Internet safety software" - B... - 0 views

  •  
    "But Computercop isn't security software -- quite the opposite; it's classic malware. The software, made in New York by a company that markets to law enforcement, is a badly designed keylogger that stores thingstyped into the keyboard -- potentially everything typed on the family PC -- passwords, sensitive communications, banking logins, and more, all stored on the hard drive, either in the clear, or with weak, easily broken encryption. And Computercop users are encouraged to configure the software to email dumps from the keylogger to their accounts (to spy on their children's activity), so that all those keystrokes are vulnerable to interception by anyone between your computer and your email server. "
‹ Previous 21 - 40 of 56 Next ›
Showing 20 items per page