WordPress has been added to the long list of data breaches in 2015. Like each of the several preceding years, this past year was the worst on record for data breaches. ITProPortal has reported that on December 10th, 2015 a breach of the popular online publishing platform occurred. Specifically, the WP engine was attacked, forcing WordPress to notify over 30,000 users of a potential compromise. So far the breach has not resulted in any misuse

Read More

There is broad agreement among cyber security experts that the use of shared secrets for authentication presents a very attractive attack vector to cyber criminals. Dark Reading cited a 2013 study conducted by Verizon which stated that weak user credentials are an entry point for hackers in about 76% of data breaches. Experts also agree that adding a second factor to the assertion of user identities significantly strengthens authentication transactions. In addition to a shared secret (e.g., a password or a PIN), second factors can include a device, such as a mobile phone, or a biometric, such as a fingerprint.

Read More

Computer Weekly has reported that more than 1,800 customer accounts at the British telecommunications company Vodafone could be at risk. Hackers gained access to the accounts sometime between October 28th and 29th using stolen email addresses and passwords. This latest event raises more concern about the security of accounts protected only by passwords. Vodafone warned customers whose accounts were affected of the potential for fraud and phishing attempts. They also warned that account details such

Read More

Why is getting cash from an ATM easier than logging into an online service? Most websites and online services now require strong passwords, which are hard to remember and cumbersome to manage. ATMs use two-factor authentication. Two-factor authentication (2FA) improves security, and it eases the burden on our memories and our methods for managing many passwords.

Read More