Featured

How does digital authentication work? And how can you implement it securely in your organisation?

In times of digital transformation, new innovations follow each other at lightning speed.For years, we saw improvement upon improvement in computers and components, and everything had to be faster and newer.More recently, attention has shifted to which technical components can contribute to a better overall solution to increase digital resilience. And authentication plays a crucial …

Continue reading How does digital authentication work? And how can you implement it securely in your organisation?

Simple security plan for IoT devices

The next big wave of cyber attacks may come from the millions of Internet of Things devices out there. If you're making or deploying IoT devices you need to up your security plan. Security is not an add-on feature; it must be built into the foundation of any given device. The level of security held …

Continue reading Simple security plan for IoT devices

NIST: SMS Authentication is not Secure.

Towards the end of July 2016, the National Institute of Standards and Technology (NIST) started the process of deprecating the use of SMS-based out-of-band authentication. Updated guidelines stated that SMS-based two-factor authentication is not secure and should be banned. It is not only insecure but also inconvenient for users, we will explain to you why …

Continue reading NIST: SMS Authentication is not Secure.

OAuth 2.0 insecure: 1 billion Androids vulnerable

Researchers find a widespread risk for users of apps with insecure OAuth 2.0 implementation, which could lead to attackers being able to access the data held within a vulnerable app. Security researchers have discovered a way to target a huge number of Android and iOS apps that could allow them to remotely sign into any …

Continue reading OAuth 2.0 insecure: 1 billion Androids vulnerable