Tag: keys

Passwords, SSH keys exposed on GitHub  
By Darren Pauli | Jan 25, 2013 | Comment Now 
GitHub search down, but user mistakes still exposed.
 
Megaupload founder eyes file-sharing sequel 
By Naomi Tajitsu | Nov 2, 2012 | Comment Now 
Content to be encrypted.
 
Microsoft under fire on Windows 8 dual-boot lockout 
By Stewart Mitchell | Sep 28, 2011 | Comment Now 
Up to equipment manufacturers to allow more than one OS.
 
Businesses ‘plagued’ by missing encryption keys 
By Tom Brewster | Mar 17, 2011 | Comment Now 
Afflicts digital certificates, too.
 
Stolen SSH keys used for attacks 
By Shaun Nichols | Aug 28, 2008 | Comment Now 
Linux keys harvested by hackers.
 
Prison keys sold on eBay 
By Iain Thomson | May 4, 2007 | Comment Now 
Quick lock change in order after security slip.
 
Be careful where you leave your keys 
By Richard Moulds | Jul 13, 2006 | Comment Now 
The internet now has 1.07 billion users worldwide and more people buy online than ever before. But this growth in ecommerce has also created a fertile environment for fraud and ...
 
Keys to addressing the data privacy mandate 
By Randy Budde | Jun 8, 2004 | Comment Now 
Enterprises worldwide are spending approximately $20 billion per year on IT security, yet very costly breaches continue to occur. In large part, this is because security ...
 
Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network 
By Chris O’Ferrell | Jan 16, 2004 | Comment Now 
As the benefits of a wireless local area network (WLAN) become more apparent, an increasing number of businesses are quick to adopt this technology.
 
Authentication: From Passwords to Public Keys 
By Anton Chuvakin | Jan 16, 2004 | Comment Now 
An exciting book on authentication, of all things?
 
Cyberterrorism: Are We Leaving the Keys Out? 
By Kevin Cunningham | Jan 15, 2004 | Comment Now 
In a post-Sept. 11 world, the security community is being asked to address a growing list of sobering scenarios that range from the newly plausible to the truly frightening.
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 650

Vote