The breach impacted email addresses, passwords, phone numbers, and other sensitive information, according to a researcher mentioned in a breach notification obtained by Motherboard.
Security researchers disclosed new work at the Chaos Communication Congress showing how hackers can bypass vein based authentication.
Researchers prove that devices can be spoofed by photos taken from social media.
All you need to get around two-factor authentication is Photoshop.
Thank cholesteric liquid crystal microspheres.
Your swipes aren't all that precious after all, according to a new study.
It should be trivial.
An entire new generation of processors will come with hardware-enabled security.
Everywhere we go, we're constantly proving that we are who we say we are.