Identity and Access Management | News, how-tos, features, reviews, and videos
Explore related topics
A researcher has released a proof-of-concept Android app that can steal 'weblogin' authentication tokens for Google accounts
Slew of vulnerabilities in IPMI standard for disaster-recovery access leaves unpatched implementations at severe risk
MongoDB user access can now be controlled and managed by Red Hat Enterprise Linux's Identity Management package
Two new Microsoft services make Windows Azure a serious competitor to Amazon Web Services
Flexible PKard Reader and elegant Tactivo bring smart card authentication to your favorite mobile device
Technical details disclosed about a vulnerability in the way Android verifies digital signatures could let attackers turn legitimate apps into Trojan programs
The vulnerability affects 99 percent of Android devices and has existed since Android 1.6, researchers from security firm Bluebox said
One critical vulnerability in the single sign-on identity management tool was fixed, but a second remains unpatched, security researchers say
A few thousand Windows users may have been automatically infected during a 36-minute period before the attack was detected
The problem, now fixed, could have allowed anyone to take over a person's account