Tag: keys

Passwords, SSH keys exposed on GitHub  
By Darren Pauli | Jan 25, 2013 | Comment Now 
GitHub search down, but user mistakes still exposed.
Megaupload founder eyes file-sharing sequel 
By Naomi Tajitsu | Nov 2, 2012 | Comment Now 
Content to be encrypted.
Microsoft under fire on Windows 8 dual-boot lockout 
By Stewart Mitchell | Sep 28, 2011 | Comment Now 
Up to equipment manufacturers to allow more than one OS.
Businesses ‘plagued’ by missing encryption keys 
By Tom Brewster | Mar 17, 2011 | Comment Now 
Afflicts digital certificates, too.
Stolen SSH keys used for attacks 
By Shaun Nichols | Aug 28, 2008 | Comment Now 
Linux keys harvested by hackers.
MySpace fixes Alicia Keys' page after cyberattack 
By Frank Washkush Jr | Nov 12, 2007 | Comment Now 
MySpace.com has cleaned up multiple attacks on some its most popular music pages, including that of Alicia Keys.
Prison keys sold on eBay 
By Iain Thomson | May 4, 2007 | Comment Now 
Quick lock change in order after security slip.
Be careful where you leave your keys 
By Richard Moulds | Jul 13, 2006 | Comment Now 
The internet now has 1.07 billion users worldwide and more people buy online than ever before. But this growth in ecommerce has also created a fertile environment for fraud and ...
Keys to addressing the data privacy mandate 
By Randy Budde | Jun 8, 2004 | Comment Now 
Enterprises worldwide are spending approximately $20 billion per year on IT security, yet very costly breaches continue to occur. In large part, this is because security ...
Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network 
By Chris O’Ferrell | Jan 16, 2004 | Comment Now 
As the benefits of a wireless local area network (WLAN) become more apparent, an increasing number of businesses are quick to adopt this technology.
Authentication: From Passwords to Public Keys 
By Anton Chuvakin | Jan 16, 2004 | Comment Now 
An exciting book on authentication, of all things?
Cyberterrorism: Are We Leaving the Keys Out? 
By Kevin Cunningham | Jan 15, 2004 | Comment Now 
In a post-Sept. 11 world, the security community is being asked to address a growing list of sobering scenarios that range from the newly plausible to the truly frightening.
Sign up to receive iTnews email bulletins
Latest Comments
Should Optus make a bid for iiNet?

   |   View results