Yahoo Mail was hacked. Details are sketchy in terms of just how many Yahoo Mail accounts have been compromised. Yahoo suggests that the attackers most likely gained access to the data through a third-party database outside of Yahoo control. Regardles...
Consumers often fail to perform transactions online due to authentication failure. But while they struggle, they also distrust websites with weak authentication procedures.
A Mozilla database was exposed to the Internet, the Mozilla Foundation disclosed
E-mail addresses and password details for 200,000 registered users of Gawker Media websites are now circulating on peer-to-peer networks after a weekend hack attack. The company warned users to change their passwords -- including on other sites, if t...
Russian password-cracking company Elcomsoft has released new software that can in some instances figure out the password used to encrypt backed-up iPhone data.
A good password can mean the difference between identity safety and identity theft. Unfortunately, too many otherwise intelligent people rely on ridiculously weak passwords, the kind that make hackers rub their hands with glee.
It's tough to keep track of all of your passwords. In spite of advances in biometrics, and increased attention on the value of two-factor authentication, passwords remain the primary means of digital security. They're also one of the weakest links in...
Paranoia--in small doses--is an excellent preventive medicine. If you think your business is too small to be a target for hackers, identity thieves, and similarly unsavory characters, you're dangerously underestimating the value of your business.
For years now I've harangued relatives about their shoddy password practices. Either they use easily-hacked passwords or forget the passwords they've created--sometimes both.
Whitepapers about passwords
Despite analysts and the media turning their attention to multi-factor authentication and biometrics, passwords are still one of the most important authentication methods. This paper discusses potential password policies. · We’re keen to move beyond passwords because they’re insecure or they waste time, and security can suffer because users have poor password hygiene · Anecdotal evidence suggests that between one-sixth and one-third of all help desk calls still focus on passwords · According to Gartner, calls for basic password resets can constitute 20% or more of calls to the average service desk
Most Popular Reviews
- 1 HTC One Mini 2 android smartphone
- 2 Microsoft Surface Pro 3 Windows 8.1 tablet
- 3 Medion Akoya E4110 (MD 8239) desktop PC
- 4 Samsung Galaxy Tab S (10.5) 4G review
- 5 Dell Inspiron 11 3000 Series convertible laptop
Best Deals on GoodGearGuide
Latest News Articles
- Malicious advertisements distributed by DoubleClick, Zedo networks
- Apple iPhone 6 hands-on
- Google to turn on encryption by default in next Android version
- Nvidia pumps more horsepower into flagship graphics chips
- CloudFlare can provide its caching service without your SSL keys
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.