Remove Access Remove Authentication Remove Passwords Remove Retail
article thumbnail

Volvo retailer leaks sensitive files

Security Affairs

The Brazilian retail arm of car manufacturing giant Volvo leaked sensitive files, putting its clientele in the vast South American country in peril. Volvo’s retailer in Brazil, Dimas Volvo, leaked sensitive files through its website. website, belonging to an independent Volvo retailer in the Santa Catarina region of Brazil.

Retail 94
article thumbnail

SHARED INTEL: IT pros gravitate to ‘passwordless’ authentication to improve security, boost agility

The Last Watchdog

Passwordless authentication as a default parameter can’t arrive too soon. That’s the upshot of a new report, The State of Passwordless Security 2021 , put out by HYPR , a New York City-based supplier of advanced authentication systems. 1 use case is remote access.”. Related: Top execs call for facial recognition to be regulated.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Secure Access for your Seasonal Workers

Thales Cloud Protection & Licensing

How to Secure Access for your Seasonal Workers. As the holiday season approaches, many retail, hospitality, logistics, and food manufacturing organizations hire seasonal workers to meet increasing demand. The Bureau of Labor Statistics reports a 7% job rise in the retail industry. Access management risks of seasonal workers.

Access 71
article thumbnail

Retail giant Home Depot agrees to a $17.5 million settlement over 2014 data breach

Security Affairs

Retail giant Home Depot has agreed to a $17.5 The US largest home improvement retailer giant Home Depot agrees to $17.5 According to the US retailer the payment card information of approximately 40 million Home Depot consumers nationwide. The post Retail giant Home Depot agrees to a $17.5 ” . . Pierluigi Paganini.

Retail 118
article thumbnail

How FIDO 2 authentication can help achieve regulatory compliance

Thales Cloud Protection & Licensing

How FIDO 2 authentication can help achieve regulatory compliance. One common denominator in all regulations is the need for strong authentication. Strong authentication is the key to eliminate a large percentage of cyber-attacks, including those based on stolen credentials and subsequent credential stuffing.

article thumbnail

Google: Security Keys Neutralized Employee Phishing

Krebs on Security

Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity. The basic model featured here retails for $20. a mobile device).

Phishing 223
article thumbnail

US citizens lost more than $68M to SIM swap attacks in 2021, FBI warns

Security Affairs

Do not provide your mobile number account information over the phone to representatives that request your account password or pin. Use a variation of unique passwords to access online accounts. Do not store passwords, usernames, or other information for easy login on mobile device applications.