Read interesting blogs for more product related information. All blogs published in this section can only be created via the system's administration interface. You are free to comment on every blog.
For the user and website provider, it is important to have a complete understanding of authentication to establish trust in critical business processes. Here we discuss the three factors of authentication.
News about online hacks are not very new to us. Every year the criminals make off with millions of passwords. Even the major websites that are known to have high security measures such as Facebook, Twitter, LinkedIn and Google are not spared from these online attacks.
Read interesting articles for more product related information. All articles published in this section can only be created via the system's administration interface. You are free to comment on every article.
US secrets are in peril as a giant hack targeted personal files of government employees that spies may use to make their way to more secure computers. Dan Payne, a senior counterintelligence official for the Director of National Intelligence immediately told Federal employees to change their passwords. According to Dan Payne, “Some of you may […]
No one is safe from hackers, even US federal employees private information gets hacked. According to Engadget, “A group of hackers has attacked the Office of Personnel Management (OPM), stealing sensitive data on 4 million current and former American federal employees. Law enforcement sources tell Reuters that the government believes the perpetrators are from China […]
A Russian criminal gang has successfully carried out the world’s largest data breach amassing over a billion usernames and passwords as well as over 500 million email addresses. First reported by the New York Times, this is the single largest breach of its kind and affects a huge variety of websites from well-known brands to […]