Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 30 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Apple security bug: the latest reason to move beyond passwords

by The Gurus
July 28, 2016
in Editor's News
apple
Share on FacebookShare on Twitter

The recent news of an iPhone bug that allows hackers to steal passwords with just a text message should serve as a stark reminder about the huge market for stolen user credentials and the vulnerability of passwords. This is according Secure Cloud Link, who argue that organisations and individuals must realise that passwords are now an untenable means of authentication and present a major security risk.

The security bug, which has now been repaired, meant that hackers had the ability to steal passwords, as well as other sensitive data. Fundamentally, an attack could give cyber criminals access to a computer’s memory where sensitive information such as passwords and login credentials are stored.

Gideon Wilkins, VP Sales and Marketing at Secure Cloudlink, said: “Any product that still depends on a password for authentication and authorisation is clearly a security risk, even those that ‘mask’ the back ended stored password with a biometric front end. This method gives a false impression of greater security as in the background passwords are still present and vulnerable to an attack, which could lead to a security breach. The only way to truly guarantee security is to break the historical link between a user’s identity and the authentication – the password. 

Dave Worrall, CTO of Secure Cloudlink, adds: “The Apple security bug highlights the huge market for stolen data, which means good security practices are more important than ever. LinkedIn, Tumblr and Myspace are just a few recent examples of data breaches that saw user credentials up for sale online, representing hackers’ appetite for passwords. Despite IT departments and security experts urging organisations and users to apply diligence with regards to password management, hacks proceed to be common place and passwords continue to be stolen.”

Wilkins concludes: “Now is the time to completely disrupt the traditional concept of passwords as a means of authentication. Although companies claim to be removing passwords, they are just masking them. As a result, the problem is still being ignored. What is needed is an approach that involves no passwords at all. No storing, no transmitting and no replicating. Secure Cloudlink helps companies with large user portals to not only secure themselves and their brand, but secure every client digital identity. Taking customers from simply removing resets, through single sign on (SSO) to truly no passwords at all, ever. Hackers can’t steal what doesn’t exist.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

59% of IT leaders believe the ‘traditional’ IT department no longer exists in modern business

Next Post

New Crowdsourced Threat Intelligence Solution to Secure Access to Data Stored in Cloud Apps

Recent News

Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information