Azure Active Director certificate-based authentication
Software king of the world Microsoft is now offering a public preview of Azure AD CBA on devices running Apple's iOS and Android that uses certificates on Yubico's YubiKey hardware security key.
I am ready for my close up Mr. DeMille
Shedloads of IP security cameras made by China-based Hikvision are still unpatched even if a fix was issued for a critical security bug nearly a year ago.
Attackers could have complete control of your Coldplay and U2 collection
Fruity cargo cult Apple has admitted that its faultless, super-cool, operating system which rules across all its devices has a feature that allows a naughty person to take control of the machine.
But don’t worry Google saves fanboys
Google researchers caught hackers targeting users in Hong Kong exploiting vulnerabilities in Apple's Mac operating system.
Just before its big iPhone announcement
Red-faced Apple has had to issue an emergency patch for a security flaw days before it is about to make a new product announcement.
Using stolen phones to empty bank accounts
Brazillian criminals have been nicking Apple fanboy’s phones, bypassing the security and employing the account holder’s bank accounts.
Remote access trojan pretends to be ransomware
The Microsoft security team has published details about a malware campaign that is currently spreading a remote access trojan named STRRAT that steals data from infected systems while masquerading as a ransomware attack.
Security experts say riff raff should not have access to all that sensitive data
More than 40 percent of staff in British and American corporations have access to sensitive data that they don't need to complete their jobs, according to recent research.
New report from Juniper Networks
With all these remote connections, video streaming and budget constraints, network security is becoming a major headache for networking professionals, according to a study released by Juniper Networks.
Check Point makes charlies out of Amazon security
Israeli Security outfit Check Point have told Wired that Alexa's Web services had bugs that a hacker could have exploited to grab a target's entire voice history, meaning their recorded audio interactions with Alexa.