article thumbnail

GitHub Discovers Authentication Issue

SecureWorld News

GitHub announced a security update due to a bug causing issues with the authentication of sessions. On March 2, GitHub received an external report of anomalous behavior for their authenticated GitHub.com user session. This would give them the valid and authenticated session cookie for another user. How did GitHub fix the issue?

article thumbnail

AI-based typing biometrics might be authentication's next big thing

Network World

Identifying or authenticating people based on how they type is not a new idea, but thanks to advances in artificial intelligence it can now be done with a very high level of accuracy, making it a viable replacement for other forms of biometrics.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

'Citrix Bleed' Vulnerability Raises Concerns as Exploits Continue

SecureWorld News

Exploiting this flaw allows threat actors to hijack legitimate user sessions, bypassing authentication protocols such as passwords and multi-factor authentication. Attackers are exploiting a known vulnerability and injecting malicious code into the login page to steal the credentials of the users who try to authenticate.

article thumbnail

Deciphering Apple’s Recently Announced Data Protection Features

Forrester IT

Here is the Forrester security and risk team’s collective analysis of these new features. Earlier this month, Apple announced several important new data protection features for general availability in 2023 that have numerous implications for security teams in all industries and geographies.

Data 195
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Zero Trust

Phil Windley

My new book Learning Digital Identity from O'Reilly Media covers many of the topics in this post such as multi-factor authentication, authorization and access control, and identity policy development in depth. User Authentication: Multi-Factor Authentication (MFA): Requiring users to provide multiple forms of verification (e.g.,

article thumbnail

DARPA offers $42 million for ‘revolutionary’ research on social media analysis

Trends in the Living Networks

It would be useful to know, for instance, whether signs of widespread rebellion were authentic or whether they were being created by a fringe group with little real support. The value for defense intelligence of social media and social network mining is evident.

Analysis 144