authentication

Pierluigi Paganini April 10, 2015
Compliance: An Often Overlooked, Powerful Method of Threat Prevention

Which are different components that must be taken into consideration  to build an efficient information security foundation and prevent cyber threats. Introduction A major obstacle that management must face in today’s world is the task of securing their organization’s assets.  While physical security is a huge component in ensuring that the residual risk level existing […]

Pierluigi Paganini March 17, 2015
Yahoo launches its on-demand password feature

Yahoo announced its new on-demand password feature that lets users into login in their account with a code sent to their mobile phone. Yahoo has announced a new Password-Free login feature to let users access their account without the need for a password. When users will sign in his account, an on-demand password is sent to a […]

Pierluigi Paganini March 03, 2015
Cognitive Fingerprints, the new frontier of authentication

DARPA is working on Cognitive Fingerprints authentication process to validate the user identity through the use of software based biometrics. Security plays a crucial role in today’s world. Whether it is a multi-billion organization or a single person with a computer, security is important for all. One of the pillars for cyber security is the […]

Pierluigi Paganini March 03, 2015
Cyber criminals target call center operators in Apple Pay fraud schema

Cybercriminals are targeting call centers operators in Apple Pay fraud to circumvent the checks implemented by Apple, banks and card issuers. The security expert Cherian Abraham revealed a spike in the fraud on Apple’s mobile payment platform, Apple Pay. The criminals are trying new techniques to compromise the Apple security chain. While the Apple devices and software are […]

Pierluigi Paganini February 19, 2015
Serious flaws allowed the deletion of any comment on Facebook

A young hacker disclosed the details of an attack that by exploiting a couple of flaws in Facebook allowed him to delete any comment on the social network. The 19-year-old hacker Joe Balhis has discovered the way to delete any comment on Facebook by leveraging a session validation flaw and a cross-site request forgery (CSRF) vulnerability. The expert highlighted that […]

Pierluigi Paganini February 12, 2015
How to hack Facebook photo album of every user

An Indian security expert Laxman Muthiyah exploited a vulnerability in Facebook Graph API mechanism to delete Facebook photo albums of every user. A critical flaw in the popular social network Facebook recently discovered could allow ill-intentioned to completely delete users’ Facebook photo album without being authenticated. According the security expert Laxman Muthiyah the vulnerability resides […]

Pierluigi Paganini January 24, 2015
SplashData published the list of Worst passwords of 2014

SplashData has published its annual report on the used of passwords that includes the list of the Worst passwords of 2014. Here we are to analyze the annual study published by SplashData, titled “123456” Maintains the Top Spot on SplashData’s Annual “Worst Passwords” List“, on the use of the passwords. Which are the most common […]

Pierluigi Paganini December 30, 2014
At the Chaos Computer Club an expert showed hot to bypass Fingerprint biometrics with a few photographs

A security expert at the conference of the Chaos Computer Club has shown how to bypass Fingerprint biometrics using only a few photographs. Fingerprint biometrics are considered by many security experts, one of the most sophisticated authentication systems that combines security and ease of use. IT giant like Apple and Samsung are looking with great […]

Pierluigi Paganini December 09, 2014
Take care of Recovery Key for Apple Two-step verification system to avoid permanently lock Apple account

If you lose your recovery key with two-step verification Apple can’t help you.By forgetting Recovery Key could completely lock a person out of their account More that one year ago Apple has introduced the two-step verification system to implement a two-factor authentication process and improve security for Apple IDs. Since March 2013 Apple has progressively extended […]

Pierluigi Paganini December 06, 2014
SpoofedMe attacks exploit popular websites social login flaws

The experts at IBM have found several problems in implementation of the social login authentication of several identity providers. The researchers at IBM’s X Force security discovered a way to gain access to Web accounts by exploiting misconfiguration in some social login services. Social login, also known as social single sign-in, is a form of single […]