article thumbnail

Your Phone May Soon Replace Many of Your Passwords

Krebs on Security

Apple , Google and Microsoft announced this week they will soon support an approach to authentication that avoids passwords altogether, and instead requires users to merely unlock their smartphones to sign in to websites or online services. “I worry about forgotten password recovery for cloud accounts.”

Passwords 247
article thumbnail

Facebook announces WhatsApp end-to-end encrypted (E2EE) backups

Security Affairs

Facebook announced it will allow WhatsApp users to encrypt their message history backups in the cloud. Facebook will continue to work to protect the privacy of WhatsApp users and announced that it will allow users to encrypt their message history backups in the cloud. ” reads the announcement published by WhatsApp. .”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: IT pros gravitate to ‘passwordless’ authentication to improve security, boost agility

The Last Watchdog

Password abuse emerged as a criminal specialty shortly after the decision got made in the 1990s to jump start the commercial Internet using a security framework built on shared secrets. Fortifications, such as multi-factor authentication (MFA) and password managers, have come along over the past decade or so to keep password abuse in check.

article thumbnail

MFA Advantages and Weaknesses

eSecurity Planet

Many stick with simple username and password combinations despite the weaknesses of this authentication method. The Problem with Passwords. Passwords are the most common method of authentication. As if their crackability wasn’t bad enough, many attackers already have the passwords and don’t need to apply brute-force attacks.

article thumbnail

A Threat to Passkeys? BrutePrint Attack Bypasses Fingerprint Authentication

eSecurity Planet

Security researchers recently published a paper detailing an attack they say can be used to bypass smartphone fingerprint authentication. An attack like BrutePrint could present a significant threat to passkeys , an increasingly popular way to replace passwords with authentication methods like fingerprint authentication or face recognition.

article thumbnail

Researchers found flaws in MEGA that allowed to decrypt of user data

Security Affairs

Researchers at ETH Zurich discovered several critical flaws in the MEGA cloud storage service that could have allowed the decryption of user data. MEGA has addressed multiple vulnerabilities in its cloud storage service that could have allowed threat actors to decrypt user data stored in encrypted form.

article thumbnail

Do scanners need to evolve like MFPs in terms of security?

Info Source

One can imagine that if the administrator password is left as the default, it could be easy to view or download the scanned or copied images from the history information. Conclusion As the paperless society progresses, the volume of paper documents themselves will decrease and MFPs will be used more as scanners.