Security News

iPhone X gets facial authentication, is the enterprise next?
2017-09-15 14:34

This week, Apple debuted the iPhone X which kills the Touch ID fingerprint scanner in favor of a 3D facial scanning technology called FaceID. Soon, iPhone users will depend on face recognition in...

Authentication Tools to Secure a Cashless Economy (InfoRiskToday)
2017-09-01 09:48

A report on advances in authentication to secure a cashless economy leads the latest edition of the ISMG Security Report. Also, we analyze the record-shattering Anthem data breach settlement.

U.S. Army to Protect Warfighters With Continuous Biometric Authentication (Security Week)
2017-08-17 13:04

U.S. Army to Deploy Continuous Biometric Authentication Cybersecurity Software to Protect Warfighters read more

Cisco Fixes DoS, Authentication Bypass Vulnerabilities, OSPF Bug (Threatpost)
2017-08-03 20:30

Cisco fixed two high severity vulnerabilities in two products this week that could have let an attacker trigger a denial of service condition or bypass local authentication.

Siemens Patches Authentication Bypass Flaw in SiPass Server (Threatpost)
2017-07-14 16:37

Siemens patches four vulnerabilities, including a critical authentication bypass flaw, in its SiPass integrated access control server.

Uber Patches Authentication Bypass Vulnerability on Custom SSO Solution (Threatpost)
2017-07-12 16:36

Uber patched an authentication bypass vulnerability in its homegrown SSO solution that allowed attackers to take over subdomains and steal session cookies.

Authentication Bypass Flaw Patched in BIND, Knot DNS (Security Week)
2017-06-30 09:39

The developers of the BIND and Knot DNS software have released updates to patch a potentially serious vulnerability that can be exploited to bypass authentication mechanisms. read more

Authentication Bypass, Potential Backdoors Plague Old WiMAX Routers (Threatpost)
2017-06-08 13:00

WiMAX routers manufactured by several companies, including Huawei and ZyXEL, are vulnerable to an authentication bypass and potential backdoors.