keys

Passwords, SSH keys exposed on GitHub

Passwords, SSH keys exposed on GitHub

GitHub search down, but user mistakes still exposed.
Darren Pauli Jan 25 2013 3:53PM Security
Megaupload founder eyes file-sharing sequel

Megaupload founder eyes file-sharing sequel

Content to be encrypted.
Naomi Tajitsu Nov 2 2012 7:52AM Storage
Microsoft under fire on Windows 8 dual-boot lockout

Microsoft under fire on Windows 8 dual-boot lockout

Up to equipment manufacturers to allow more than one OS.
Stewart Mitchell Sep 28 2011 7:09AM Software
Businesses ‘plagued’ by missing encryption keys

Businesses ‘plagued’ by missing encryption keys

Afflicts digital certificates, too.
Tom Brewster Mar 17 2011 1:38PM Security
Stolen SSH keys used for attacks

Stolen SSH keys used for attacks

Linux keys harvested by hackers.
Shaun Nichols Aug 28 2008 4:01PM Security
MySpace fixes Alicia Keys' page after cyberattack

MySpace fixes Alicia Keys' page after cyberattack

MySpace.com has cleaned up multiple attacks on some its most popular music pages, including that of Alicia Keys.
Frank Washkush Jr Nov 12 2007 9:47AM Security
Prison keys sold on eBay

Prison keys sold on eBay

Quick lock change in order after security slip.
Iain Thomson May 4 2007 2:20PM Security
Be careful where you leave your keys

Be careful where you leave your keys

The internet now has 1.07 billion users worldwide and more people buy online than ever before. But this growth in ecommerce has also created a fertile environment for fraud and security threats.
Richard Moulds Jul 13 2006 11:56AM Security
Keys to addressing the data privacy mandate

Keys to addressing the data privacy mandate

Enterprises worldwide are spending approximately $20 billion per year on IT security, yet very costly breaches continue to occur. In large part, this is because security efforts have mainly been focused on network security rather than data privacy. Data privacy is the process of securing critical data as it is being stored, transmitted, and used within the enterprise.
Randy Budde Jun 8 2004 12:02PM Security
Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

As the benefits of a wireless local area network (WLAN) become more apparent, an increasing number of businesses are quick to adopt this technology.
Chris O’Ferrell Jan 16 2004 11:12AM Security
Authentication: From Passwords to Public Keys

Authentication: From Passwords to Public Keys

An exciting book on authentication, of all things?
Anton Chuvakin Jan 16 2004 11:01AM Security
Cyberterrorism: Are We Leaving the Keys Out?

Cyberterrorism: Are We Leaving the Keys Out?

In a post-Sept. 11 world, the security community is being asked to address a growing list of sobering scenarios that range from the newly plausible to the truly frightening.
Kevin Cunningham Jan 15 2004 10:01AM Security

Log In

  |  Forgot your password?