- AT&T hacker Weev released from prison after appeals court overturns conviction
- Symantec draws new security picture
- German researchers hack Galaxy S5 fingerprint login
- Heartbleed panic drives flood of enquiries to Symantec's Melbourne CA
- JP Morgan to invest £150 million on boosting cyber security
Think about it: Who should be allowed to see photos of you drunk?
Once upon a time some Carnegie Mellon University researchers came up with a scheme to use stories and pictures to help users live happily ever after by creating and remembering dozens of passwords – and avoiding use of the exact same passwords for multiple sites.
Researchers from Carnegie Mellon University and Army Research Laboratory will join forces with those from a handful of universities in an effort to better automate cybersecurity decisions. The five-year project has attracted $23.2 million in funding from CMU's CyLab, and could be extended to $48.2 million over 10 years.
A password made up of a phrase or short sentence may be more secure than a carefully constructed long one, countering the recommendations of some security experts.
You’re best off forgetting your grammar lessons when it comes to creating passphrases, according to new research out of Carnegie Mellon University and MIT.
Sign up now »
Manage and visualize the security and compliance of VMware, physical, and hybrid-cloud infrastructure from the RSA Archer eGRC Platform.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.