After the security breach that resulted in LinkedIn, eHarmony and Yahoo Voices users having their password hashes being published, there has been talk about storing passwords with salts. What does this mean?Read More >
The usernames and passwords for more than 10,000 job applicants for positions with China's State Administration of Foreign Experts Affairs are accessible to the outside world at loosely protected or unprotected computer servers operated by the Chinese government, according to a security researcher.Read More >
German researchers recently discovered how easy it is for someone to jailbreak your iPhone and reveal your passwords in six minutes. This type of hack doesn’t require the use of the phone’s passcode, mainly because the cryptographic key on current iOS devices operates independently from it.
The attack works based on existing vulnerabilities on Apple’s iPhone that enable access to the operating file system. Many of the passwords available to the attacker range from Google or Microsoft Exchange email accounts to VPN and WiFi access and more.Read More >
A recent study investigates how inadequate security and privacy features make it possible to turn household robots into machines for spying and vandalism.Read More >