A third of Chrome extensions use libraries with known vulnerabilities, a handy new tool finds
If you're inundated with requests to use Chrome extensions, CRXcavator could be a god send.
If you're inundated with requests to use Chrome extensions, CRXcavator could be a god send.
Old versions of Flash, Java, and Internet Explorer on Windows continue to create a soft underbelly for the enterprise, according to a new study by authentication firm Duo Security.
There have been so many major data breaches over the past year or two that it's hardly even news anymore when millions of customer accounts are compromised. We've become jaded, and just expect that attackers will find a way to penetrate our networks and steal our data. The reality, however, is that there is one simple thing companies--and individuals--can do that will prevent the vast majority of data breaches: two-factor authentication.
Tony Bradley | 20 Jan | Read more
We've had enough malware campaigns and data breaches to confirm the need for better data protection online. The Universal 2nd Factor (U2F) standard is a step in the right direction, and the first compatible devices are coming out now.
Tony Bradley | 22 Oct | Read more
A PayPal error made it possible to bypass two-factor authentication on a user account, demonstrating what can go wrong in deploying a tricky security mechanism.
Antone Gonsalves | 26 Jun | Read more