Authentication using visual codes: what can go wrong
Posted on 18 December 2013.
Several password replacement schemes have been suggested that use a visual code to log in. However the visual code can often be relayed, which opens up a major vulnerability. Can anything be done, and what compromises need to be made to protect users?
Learn more in this PasswordsCon Bergen 2013 presentation by Chris Warrington, Pico project, University of Cambridge.
Posted on 23 July 2014. | Cybercriminals no longer send out thousands of emails at random hoping to get a handful of hits, today they create highly targeted phishing emails which are tailored to suit their recipients.
Posted on 22 July 2014. | A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.