It remains the conversation we're afraid to have: the one that leads us to the conclusion that the only way to secure our communications is with a system that reliably identifies us.
Apple has expanded the use of two-factor authentication to protect iCloud backups.
At a recent security conference in London, a researcher was able to hack into the web interface of a wireless Canon Pixma printer, used extensively by small and medium-sized enterprises and run the video game Doom on the printer's menu screen, Ars Technica reports.
Wells Fargo has taken three mobile banking-related startups under its wing as part of its first official accelerator program.
Consumers end up paying for data breaches whether their personal information was compromised or not. That is the conclusion of an analysis prepared by two-factor authentication firm Authentify.
If someone steals your phone then logs onto your apps, those apps may think they're working with you. What if the connection between you and those apps could be severed first?
The identity assertion language that developers adopted for authentication just four years ago may already be outdated, says someone you'd think would be SAML's evangelist.
Apple is tweaking its two-factor authentication system to make it more robust for users accessing the company's iCloud Web apps from a Web browser. According to a report on AppleInsider, this entails the use of a verification code sent via text message to a trusted iOS device for accounts with 2FA enabled.
A tweet-chat session between experts in authentication, some well-known journalists, and myself, reveals the role our own perception plays in the security problem.
Elcomsoft has developed a way to access files stored within Apple's iCloud service without knowing a person's Apple ID. Developed by the well-known Russian company to help law enforcement analyze seized computers, the tool works by making use of special authentication tokens obtained from suspects' computers.