Authentication using visual codes: what can go wrong
Posted on 18 December 2013.
Several password replacement schemes have been suggested that use a visual code to log in. However the visual code can often be relayed, which opens up a major vulnerability. Can anything be done, and what compromises need to be made to protect users?
Learn more in this PasswordsCon Bergen 2013 presentation by Chris Warrington, Pico project, University of Cambridge.
Posted on 31 October 2014. | Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies.
Posted on 30 October 2014. | More than 200 organisations and 400 cyber-security professionals from 29 European countries are testing their readiness to counter cyber-attacks in a day-long simulation, organised by the European Network and Information Security Agency (ENISA).