-
In some respects, for the masses of grownups seeking mates, either for a night or for life, dating is an attempt to approximate the collegiate condition that surfeit both of supply and demand, of information and authentication.
NEWYORKER: Looking for Someone
-
Not only the important information but also the entire Linux environment including authentication services is encrypted in ROM (Read Only Memory).
ENGADGET: Panasonic and Red Bend Software announce Android security partnership at MWC
-
Will the taxi driver app providers be upgrading their apps to utilize some form of initial authentication to ensure that only drivers get access to passenger location information?
FORBES: Smartphone Taxi E-Hail Apps: New Convenience or Potential Deathtrap
-
Warnings to users (perhaps at certain times and locations), initial authentication, background check requirements, reporting and logging pickup location information and details as to which drivers saw which passenger signals, as well as logging all driver locations on an ongoing basis are some initial suggestions.
FORBES: Smartphone Taxi E-Hail Apps: New Convenience or Potential Deathtrap
-
While at this time we are confident that the information extracted does not enable a successful direct attack on any of our RSA SecurID customers, this information could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack.
FORBES: Hackers Steal Sensitive Data From EMC's Security Division
-
Ashkan Soltani, an independent privacy and security researcher, said such a move would give attackers "a toehold" in Twitter's internal network, potentially allowing them either to sniff out user information as it traveled across the company's system or break into specific areas, such as the authentication servers that process users' passwords.
NPR: Twitter Says Hackers Compromise 250K Accounts