What is Two-Factor Authentication?

/
It is an authentication process where two of three recognized factors are used to identify a user: Something you know - usually a password, passcode, passphrase or PIN. Something you have - a cryptographic smartcard or token, a chip enabled bank card or an RSA SecurID-style token with rotating digits Something you are - fingerprints, iris patterns, voice prints, or similar

The C.I.A. Triad or C.I.A. Triangle and Other Security Concepts

/
Information security is the method of providing confidentiality, integrity and availability to data, information, applications and equipment for those who needs it. The key concept to providing such a level of protection falls on the concept of The C.I.A. triangle which consist of: – Confidentiality – Integrity – Availability

MIRcon 2013 – New Keynote Speakers Announced

/
Less Than One Month Until MIRcon 2013! We’ve been busy making sure that this year’s conference is the best one yet and look forward to welcoming you to MIRcon 2013 in just a few weeks. Here’s some information on the latest additions to the agenda and a few tips to make sure that you get the most out of the conference.

Blackhole Suspect Arrested in Russia

/
Russian authorities have arrested a man believed to be responsible for distributing a notorious software kit known as "Blackhole" that is widely used by cybercriminals to infect PCs, according to a person familiar with the situation.

Beware of fake ‘Obamacare’ sites that want to steal your info

/
President Barack Obama's health care reform law kicks in Oct. 1, and cybercriminals, along with health care providers, are standing by, only too eager for you to share your personal information.

Adobe says customer info, source code hacked

/
Adobe Systems said on Thursday it was the victim of sophisticated cyberattacks on its networks by hackers who accessed data belonging to millions of customers along with the source code to some of its popular software titles.

Another iPhone Security Issue

/
If the latest security bug findings are verified, it would mark at least the fifth security bug in the iPhone and its iOS operating system uncovered since July. Apple has already fixed some of those flaws, including one disclosed at a summer hacking conference that make the devices vulnerable to snooping.

Hack3rCon^4 – Eye of the Storm?

/
304Geeks want to welcome you to another year of mayhem in the hills. Hack3rCon^4 will present a mix of cyber and personal security topics and techniques.

Information Security Strategy: Stop Punishing End Users

/
For many years, companies have focused their security efforts on implementing rules to lock down the end user. I learned the hard way that this strategy doesn't necessarily lead to better security.

The ultimate keylogger: FBI’s Magic Lantern

/
While keyloggers maybe popularly associated with hackers and identity thieves in the digital realm, they have one more master that we often overlook i.e. the FBI. The Magic Lantern was a special program which used tricks only known to black hat hackers. It infiltrates a target’s system and steals all kinds of data. This infographic looks at how the Magic Lantern progressed over time, and precisely what the rootkit can help steal from a target’s system.