Tag: password

The Devil's Ivy flaw was discovered in security cameras made by Axis Communications, but affect a much wider population of devices. (Image courtesy of Senrio.)

Was the Devil’s Ivy Vulnerability a Dud? Don’t Count on It.

In-brief: The Devil’s Ivy vulnerability in the open source gSOAP library is widespread and supposedly trivial to exploit. So why, one month later, haven’t we seen any attacks? Is Devil’s Ivy a dud? ‘Don’t count on it,’ security experts tell us.

U.K. Parliament Attack Reshines Light on Persistent Vulnerability of Passwords

U.K. Parliament Attack Reshines Light on Persistent Vulnerability of Passwords

In-brief: Password security remains a thorn in the side of security experts as once again proven by the cyberattack on U.K. Parliament, which focused on gaining access to members’ e-mail accounts merely by guessing their passwords.

What’s a Good Password? NIST says One that hasn’t been stolen

What’s a Good Password? NIST says One that hasn’t been stolen

In-brief: what’s a good password? According to new guidelines from NIST: one that hasn’t already been stolen by hackers.

Remote Desktop Protocol hacks affected education and healthcare networks the most, an analysis by Flashpoint revealed.

Analysis of 85K Remote Desktop Hacks Finds Education, Healthcare Top Targets

In-brief: An analysis of 85,000 hacked Remote Desktop Protocol servers from the cyber criminal marketplace xDedic shows that education and healthcare networks were the most often targeted by hackers, who often used brute force password guessing to gain access. 

Online Security Protection Internet Safety Office Desk Concept

Podcast: Passwords are dying, but they’re not going anywhere

In-brief: Companies like Microsoft and Google have both unveiled initiatives that de-emphasize the traditional, static, alpha-numeric password in recent days. So is the password going the way of the horse and buggy? Don’t be so sure, says Robert Capps of the firm NuData. Capps thinks that passwords will be with us for the foreseeable future and that companies concerned about security need to do more than just find a more secure way to log-in.