article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Compromised logins continue to facilitate cyber attacks at all levels, from phishing ruses to credential stuffing to enabling hackers to probe deep inside of a breached network. Username and password logins emerged as the go-to way to control access to network servers, business applications and Internet-delivered consumer services.

Passwords 164
article thumbnail

The Week in Cyber Security and Data Privacy: 29 January – 4 February 2024

IT Governance

INTERPOL operation targets global cyber crime Operation Synergia, an INTERPOL operation involving 60 law enforcement agencies from more than 50 countries, has identified 1,300 malicious command-and-control servers involved in phishing , malware and ransomware attacks. Key dates 31 March 2024 – PCI DSS v4.0 of the Standard.