Associate
Partner
Practo Logo
You are here:
passwords
#

passwords

Articles

View all

Being Mobile: 7 security resolutions individuals should make in 2015

Jan 30, 2015

Being Mobile: 7 security resolutions individuals should make in 2015

Don't leave your smartphone or tablet unattended in public: It only takes a few seconds for someone to use an open device to collect login information and copy passwords. #Security #Bluetooth #Password #mobile Symantec #Norton by Symantec
End of alphanumeric passwords? Biometric authentication app downloads to reach 770 million by 2019

Jan 20, 2015

End of alphanumeric passwords? Biometric authentication app downloads to reach 770 million by 2019

The study argued that fingerprint authentication would account for the overwhelming majority of such apps in the medium term, driven by increasing deployment of fingerprint scanners within mid-range smartphones. #Apple #passwords #Touch ID #Fingerprint scanner #Juniper Research #Biometric authentication #Biometric authentication apps
Yahoo email account passwords stolen

Jan 31, 2014

Yahoo email account passwords stolen

Yahoo said Thursday that usernames and passwords of its email customers have been stolen and used to access accounts, but the company isn't saying how many accounts have been affected. #Yahoo! #Technology #Internet security #passwords #email accounts
Forget passwords, new system uses daily activities to log you into your accounts

Jan 07, 2014

Forget passwords, new system uses daily activities to log you into your accounts

It uses software running in the background on a computer or smartphone to log your activities. The system can, for instance, note how long you spent playing a video game, which one it was and the time you stopped. #social media #facebook #Twitter #TechBuzz #Password #Foursquare #New Scientist #narrative authentication
New Microsoft tool helps you pick a secure password

Dec 08, 2013

New Microsoft tool helps you pick a secure password

The tool 'Telepathwords' tries to predict the next character of your passwords by using knowledge of: common passwords, such as those made public as a result of security breaches, common phrases and common password-selection behaviors. #Microsoft #TechBuzz #Password #Telepathwords