keys

Passwords, SSH keys exposed on GitHub

Passwords, SSH keys exposed on GitHub

GitHub search down, but user mistakes still exposed.
Jan 25 2013 3:53PM
Megaupload founder eyes file-sharing sequel

Megaupload founder eyes file-sharing sequel

Content to be encrypted.
Nov 2 2012 7:52AM
Microsoft under fire on Windows 8 dual-boot lockout

Microsoft under fire on Windows 8 dual-boot lockout

Up to equipment manufacturers to allow more than one OS.
Sep 28 2011 7:09AM
Businesses ‘plagued’ by missing encryption keys

Businesses ‘plagued’ by missing encryption keys

Afflicts digital certificates, too.
Mar 17 2011 1:38PM
Stolen SSH keys used for attacks

Stolen SSH keys used for attacks

Linux keys harvested by hackers.
Aug 28 2008 4:01PM
MySpace fixes Alicia Keys' page after cyberattack

MySpace fixes Alicia Keys' page after cyberattack

MySpace.com has cleaned up multiple attacks on some its most popular music pages, including that of Alicia Keys.
Nov 12 2007 9:47AM
Prison keys sold on eBay

Prison keys sold on eBay

Quick lock change in order after security slip.
May 4 2007 2:20PM
Be careful where you leave your keys

Be careful where you leave your keys

The internet now has 1.07 billion users worldwide and more people buy online than ever before. But this growth in ecommerce has also created a fertile environment for fraud and security threats.
Jul 13 2006 11:56AM
Keys to addressing the data privacy mandate

Keys to addressing the data privacy mandate

Enterprises worldwide are spending approximately $20 billion per year on IT security, yet very costly breaches continue to occur. In large part, this is because security efforts have mainly been focused on network security rather than data privacy. Data privacy is the process of securing critical data as it is being stored, transmitted, and used within the enterprise.
Jun 8 2004 12:02PM
Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

As the benefits of a wireless local area network (WLAN) become more apparent, an increasing number of businesses are quick to adopt this technology.
Jan 16 2004 11:12AM
Authentication: From Passwords to Public Keys

Authentication: From Passwords to Public Keys

An exciting book on authentication, of all things?
Jan 16 2004 11:01AM
Cyberterrorism: Are We Leaving the Keys Out?

Cyberterrorism: Are We Leaving the Keys Out?

In a post-Sept. 11 world, the security community is being asked to address a growing list of sobering scenarios that range from the newly plausible to the truly frightening.
Jan 15 2004 10:01AM

Log In

Username:
Password:
|  Forgot your password?