Tag: keys

Passwords, SSH keys exposed on GitHub  
By Darren Pauli | Jan 25, 2013 | Comment Now 
GitHub search down, but user mistakes still exposed.
Megaupload founder eyes file-sharing sequel 
By Naomi Tajitsu | Nov 2, 2012 | Comment Now 
Content to be encrypted.
Microsoft under fire on Windows 8 dual-boot lockout 
By Stewart Mitchell | Sep 28, 2011 | Comment Now 
Up to equipment manufacturers to allow more than one OS.
Businesses ‘plagued’ by missing encryption keys 
By Tom Brewster | Mar 17, 2011 | Comment Now 
Afflicts digital certificates, too.
Stolen SSH keys used for attacks 
By Shaun Nichols | Aug 28, 2008 | Comment Now 
Linux keys harvested by hackers.
MySpace fixes Alicia Keys' page after cyberattack 
By Frank Washkush Jr | Nov 12, 2007 | Comment Now 
MySpace.com has cleaned up multiple attacks on some its most popular music pages, including that of Alicia Keys.
Prison keys sold on eBay 
By Iain Thomson | May 4, 2007 | Comment Now 
Quick lock change in order after security slip.
Be careful where you leave your keys 
By Richard Moulds | Jul 13, 2006 | Comment Now 
The internet now has 1.07 billion users worldwide and more people buy online than ever before. But this growth in ecommerce has also created a fertile environment for fraud and ...
Keys to addressing the data privacy mandate 
By Randy Budde | Jun 8, 2004 | Comment Now 
Enterprises worldwide are spending approximately $20 billion per year on IT security, yet very costly breaches continue to occur. In large part, this is because security ...
Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network 
By Chris O’Ferrell | Jan 16, 2004 | Comment Now 
As the benefits of a wireless local area network (WLAN) become more apparent, an increasing number of businesses are quick to adopt this technology.
Authentication: From Passwords to Public Keys 
By Anton Chuvakin | Jan 16, 2004 | Comment Now 
An exciting book on authentication, of all things?
Cyberterrorism: Are We Leaving the Keys Out? 
By Kevin Cunningham | Jan 15, 2004 | Comment Now 
In a post-Sept. 11 world, the security community is being asked to address a growing list of sobering scenarios that range from the newly plausible to the truly frightening.
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency