Authenticating users: Going beyond the password Alfonso Barreiro describes the most common authentication factors in use today and lists their strengths and weaknesses. What is the next step in authentication strategies? Read more Android malware sees 'exponential growth' Kara Reeder reports on the increased risk associated with downloading Android apps. Read more Infographic: The price of a stolen identity How much is an online identity worth to cybercriminals? This infographic shows how much money is involved in the industry of online identity thefts. Read more |
No comments:
Post a Comment