British Airways Hit with Largest ICO Fine in History

SecureWorld News

The airline could have easily avoided a cyber attack of this magnitude. Featured Cybersecurity Airline Security Cyber Attacks Original ContentThis week, the U.K.'s

Passwords Are Ruining the Web

Phil Windley

Chances are, if you're like me, that you pick up your phone and use a biometric authentication method (e.g. Then, if you use multi-factor authentication (and you should), you get to open up your phone, find the 2FA app, get the code, and type it in.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

It's 2017 and changing other people's flight bookings is incredibly easy

Network World

The travel booking systems used by millions of people every day are woefully insecure and lack modern authentication methods. Karsten Nohl and Nemanja Nikodijevic from Berlin-based consultancy Security Research Labs have spent months investigating the security employed by the Global Distribution Systems (GDSs) that are used by travel agencies, airlines, hotels and car rental companies.

Week in Review: Most popular stories on GeekWire for the week of Feb. 28, 2021

GeekWire

Auth0, the billion-dollar Seattle-area startup that is a leader in identity authentication software, is being acquired by Okta, another leader in the space, the companies announced Wednesday. What it was like to fly — and land — in Alaska Airlines’ first commercial 737-MAX 9 flight.

Building Identity Systems on the Sovrin Network

Phil Windley

When I say "digital identity system" most people probably think of just one thing: authentication. Airline or train ticket. Certificate of authenticity (e.g. Airline Tickets —Airline tickets are a special kind of credential that is purchased.

Salesforce Ventures leads $120M round in Auth0 as pandemic fuels Seattle-area startup’s identity tech

GeekWire

Auth0 is raising another big swath of cash as demand for its identity authentication software rises amid the COVID-19 pandemic. Its platform includes services like single sign-on, two-factor authentication, password-free login capabilities, and the ability to detect password breaches.

Multi-Source Identity

Phil Windley

Online, various, so-called "identity providers" authenticate people using usernames and passwords and provide a fixed, usually limited set of attributes about the subject of the identity transaction. Mutual exchange of keys is a big step up from SSL-mediated transactions on the Web where only one-side is cryptographically authenticated. In Sovrin, mutually authenticated connections are built into every relationship.

Fed Tech News Roundup 8 July 2015

CTOvision

Privileged user authentication and PKI are. All United Airlines flights in US grounded: Computer “glitch” cited as cause CTOvision (Today) - The entire U.S.

Want to change the world? ‘Secure’ the Next Killer App in IoT

The Investing Edge

For example, data off airline engines is collected to predict – and prevent – anomalies in the engine throughout the flight. Carl Levine, community manager at Dyn , noted that despite two-factor authentication across servers for their clients, this topic is still one of the most discussed issues. “We’ll “What’s the next killer app in the Internet of Things?”. It was the first of many topics of discussion at the Ascent B2B IT Forum in Cambridge on Tuesday night.

Deloitte’s cloud server emails hacked

IT Manager Daily

On top of those, many major companies were hit: Fannie Mae and Freddie Mac, FIFA, four global banks, three airlines, two multinational car manufacturers, energy giants and big pharmaceutical companies had their stored emails compromised. The admin account was lacking the added protection of 2-factored authentication. Another hack rocked the world when Deloitte announced that it had been compromised in an attack about a year ago.

Top 10 Best Apps For Saving Money

TechnoBezz

The app is safe and secure as it comes with multi-factor authentication. It will help you find flights you need at the best prices, so you will be able to save some money on airline tickets. Have you ever tried some of the best apps for saving money when purchasing something? If not, maybe now is the time to do so. These apps can help you find discounts and special offers and you can get coupons as well, so you will be able to save money on clothes, groceries, and many other things.

The Sony Hack in Context

CTOvision

Similarly, notwithstanding numerous intelligence warnings of a major pending terrorist attack, nothing was done to strengthen airline or border security, much less go on the offensive against Al Qaeda, until America suffered the loss of over 3000 lives and the destruction of the World Trade Towers on September 11 th , 2001. Criteria might include such things as double authentication, end point security, heuristic malware detection technology etc. By Chris Mellon.

The Laws of Identity

Phil Windley

The parties in a relationship can use the private DIDs and their associated public keys to mutually authenticate. The credentials might be the kinds of things we typically think of as a credential, but might also be things that aren't often thought of that way like an airline boarding pass or a prescription for medicine.

Top 13 must-read books for HR professionals

Hacker Earth Developers Blog

Fierce Conversations, targeted mainly at a business audience , emphasizes the need for tough, authentic conversations to enable growth and gives you seven guiding principles to take away with you. In his book, Murphy tells you how to evaluate attitudinal characteristics to identify top performers through tests and sample interview questions, using case studies from companies such as Southwest Airlines and The Four Seasons.

13 must read books for HR professionals

Hacker Earth Developers Blog

Fierce Conversations, targeted mainly at a business audience , emphasizes the need for tough, authentic conversations to enable growth and gives you seven guiding principles to take away with you. In his book, Murphy tells you how to evaluate attitudinal characteristics to identify top performers through tests and sample interview questions, using case studies from companies such as Southwest Airlines and The Four Seasons.

VMworld 2014 Day 2 Keynote

Scott Lowe

Poonen uses an example of a rooftop infinity pool in Singapore as a metaphor for the “three foundations” of EUC: SDDC, workspace services (authentication and content collaboration, for example), and then the desktop/mobile/cloud experience. Poonen talks about how United Airlines is transforming their operations uses mobile devices (supported by Apple devices and AirWatch by VMware). This is a semi-liveblog of the day 2 keynote at VMworld 2014 in San Francisco.

SeanDaniel.com [tech]: Understanding SSL Certificates

Sean Daniel

Certificates provide two purposes: Authenticating the server to the client Providing encryption between the server and the client I will cover the authenticating the server to the client in this part 1 post, and will write a part 2 post that handles the second part of encryption. Part 1 – Authenticating the Server to the Client Think of a certificate like a drivers license; a United States drivers license as that’s what I’m most familiar with.

SMB 43

13 must read books for HR professionals

Hacker Earth Developers Blog

Fierce Conversations, targeted mainly at a business audience , emphasizes the need for tough, authentic conversations to enable growth and gives you seven guiding principles to take away with you. In his book, Murphy tells you how to evaluate attitudinal characteristics to identify top performers through tests and sample interview questions, using case studies from companies such as Southwest Airlines and The Four Seasons.