by Tricerion | Jun 19, 2019 | Passwords, Phishing, Vulnerabilities
As published on infosecurity-magazine.com Yesterday’s concept of ‘strong passwords’ has become today’s bad joke, since passwords are not cracked any more, they are simply harvested by means of fake phishing sites or Trojan spyware planted on the user’s PC. Against...
by Tricerion | Feb 26, 2015 | Cyberthieves, Passwords, Phishing, Trends, Vulnerabilities
As you are reading this post, several thousand data records will have been stolen. A recent study published by Gemalto shows that almost a billion data records were lost in 2014 as a result of 1,352 major data breach incidents that occurred around the world, with the...
by Tricerion | May 28, 2014 | Banking, Cyberthieves, Passwords, Trends, Vulnerabilities
If cyber crime in 1990s was the Wild West and you had to ride the mail coach to be noticed and targeted by for criminals, modern cyber attacks look more like nuclear bomb blasts. Criminals go for massive data breaches because a phishing attack is a numbers game. The...
by Tricerion | Mar 30, 2014 | Passwords, Phishing, Trends, Usability, Vulnerabilities
It is obvious that humans learn by engaging all of our five senses. Our brain processes our experience and stores memories acquired through different sensory channels. We start learning the Alphabet Song long before we are able to know what each letter looks...
by Tricerion | Feb 28, 2014 | Cyberthieves, Passwords, Phishing, Retail, Trends, Usability, Vulnerabilities
Authentication is more like sushi than vintage art. It’s best when it’s fresh, and aging it only decreases the value. Vintage art appreciates in value over time, but security credentials are perishable products. You may be attached to your...
by Tricerion | Jan 20, 2014 | Passwords, Retail, Vulnerabilities
How creative are you when it comes to ordering a drink at Starbucks? Apparently, you are just as likely to keep ordering the same beverage as you are to use the same password for multiple websites. In an article in Computerworld Evan Schuman notes the security...