by Schehrezade Davidson | Apr 28, 2013 | Passwords, Trends, Usability, Vulnerabilities
A study of 1,200 corporate employees in the UK revealed that only a direct and personal experience of cybercrime will trigger a change in attitude and online habits. The following statistics are telling: 55% – Number of employees who actively follow online...				
					
			
					
				
															
					
					 by Schehrezade Davidson | Mar 27, 2013 | Passwords, Trends, Usability
Passwords, authentication tokens, biometrics – who needs those when brain waves from an EEG are both unique to the individual and un-fakeable? Well, perhaps Steven Spielberg and Tom Cruise could come up with a scenario where EEG readings are at risk from “precogs,”...				
					
			
					
				
															
					
					 by Schehrezade Davidson | Jan 30, 2013 | Cyberthieves, Phishing, Trends, Vulnerabilities
State, city, and county government agencies around the USA, and likely elsewhere, are adopting two-factor authentication as a means to comply with regulations for increased information security. Yet, when the consensus about such methods is largely negative, we...				
					
			
					
				
															
					
					 by Schehrezade Davidson | Nov 14, 2012 | Passwords, Phishing, Retail, Trends, Usability, Vulnerabilities
Do you like your friends and family? Let’s assume you do. And assuming you like them, you probably don’t want them to have their identity stolen by hackers. Am I right? Well then, let’s take a look at a few products on the market this year that must have been designed...				
					
			
					
				
															
					
					 by Schehrezade Davidson | Aug 7, 2012 | Trends, Usability, Vulnerabilities
The scenario is all too familiar. Aunt Myrtle calls, knowing you’re into “all that computer stuff.” She got an email from her online book seller asking her to please verify her information. Since you’ve already told her not to click on things...				
					
			
					
				
															
					
					 by Schehrezade Davidson | Jul 30, 2012 | Cyberthieves, Passwords, Trends, Usability, Vulnerabilities
Fingerprints, iris scans – in the movies they’re super secure. So secure that fictional crooks will kidnap or maim biometric “key holders” for the use of their fingerprint or eye. Ah, yes, if it’s in a Bond movie or it gives Jason Bourne...