Advertisement
Top

Author: ITCurated


Cyber warfare, Editorial

Help improve safety in case of power grid cyber-attacks!

June 15, 2016

Via: Russel Edwards

The December 2015 Ukraine cyber-attack that took control of the Prykarpattyaoblenergo Control Center (PCC) in the Ivano-Frankivsk region serves as study-case for all cyber-security researchers concerned with possible similar incidents in the US. The said APT attack was performed via […]


Editorial, Mobile security

How DARPA crushed the hopes for touch-based authentication

June 8, 2016

Via: Russel Edwards

Smartphones head towards touch-based continuous authentication – a type of permanent identity validation that is also passive, since it does not hinder in any way other human-phone interactions that may be taking place during the same time. That would eliminate […]


Editorial, Mobile security

Find out the basics on the most famous mobile payment systems

June 1, 2016

Via: Russel Edwards

While a recent report coming from the Institute of Electrical and Electronics Engineers shows that according to nearly 1400 tech enthusiasts (out of 2000 surveyed) mobile payment is sure to take over the payment market and clearly will surpass cash […]


Cloud security, Editorial

Is homomorphic encryption the ultimate in cloud security?

May 25, 2016

Via: Russel Edwards

The simplest way to describe homomorphic encryption would be the following: HE is the particular type of converting data into cipher text that allows this encrypted data to further get analyzed, permuted, associated to, and generally used into various computations […]


Editorial, Network security

Network events monitoring – enjoy an useful cyber-sentinel

May 18, 2016

Via: Russel Edwards

In-depth cyber defense sees the process of stopping attacks as being only half of the protection activity. Going to the roots of the incident or of the event and thus preparing the system in order to fend off future similar […]


Editorial

Protect your company from the risks of metadata shadows

May 11, 2016

Via: Russel Edwards

Metadata represents the context generated by and/or surrounding all digital communications, or the traces left by digital data during its processing and digital existence. Since it may be construed as a digital halo that reflects the characteristics of the user […]


Editorial, Vulnerabilities

Fast&dangerous: do you know the risks of URL shorteners?

May 5, 2016

Via: Russel Edwards

URL shorteners are right under our eyes. You may have noticed how for a while now many of the links shared online, especially (but not exclusively) on social networks started to look like “http://tinyurl.com/SomethingSomething”. Replace tinyurl with goo.gl or bit.ly […]


Application security, Editorial, Privacy protection

What do you know on language-theoretic security?

April 20, 2016

Via: Russel Edwards

Language-theoretic security or LangSec is a cyber-security approach that aims at eliminating cyber-risks from their programming roots. From this new perspective, all Internet cyber-risks originate in ad-hoc programming and untrusted inputs that form layer upon layer of coding with potential […]


Editorial, Vulnerabilities, Wireless security

When threats lay dormant in your wireless peripherals

April 13, 2016

Via: Russel Edwards

It is an element of progress to have our mouse or keyboard wirelessly communicating with the computer, but have you ever wondered what dangers lie dormant in this efficient technology? A pair of Bastille researchers decided to verify just how […]


Editorial, Privacy protection

Acoustic fingerprinting, suspended between privacy and marketing tech

April 7, 2016

Via: Russel Edwards

If the denomination of acoustic fingerprinting does not fully reveal the core concept, then maybe defining this type of fingerprinting as the mark/pattern based on a digital summary extracted from a short audio signal (summary that includes identifying, recognizing and […]


Cyber warfare, Editorial

Have you considered improving your IR strategy?

March 30, 2016

Via: Russel Edwards

The Incident Response procedure (or IR strategy) is part of the cyber-security control measures. Following prevention and detection, the IR strategy is critical for the situations where the system has been affected by a breach or by another cyber-security event. […]


Access control, Editorial

Password? No, thanks, I have mobile authentication!

March 23, 2016

Via: Russel Edwards

The future might replace passwords with mobile authentication. Recently the World Wide Web Consortium (W3C) announced on 17 February this year that it launched a new standards effort in view of a different web authentication method  – “a more secure […]


Editorial, Email security, Phishing

How to escape the BEC scam – when authority emails equal fraud

March 16, 2016

Via: Russel Edwards

Lately many cyber-security online sources warned enterprises of the business email compromise scheme (also known as the BEC scam), and they do this for a good reason: this fraud method has spiked over the last few months. BEC attacks are […]


Access control, Editorial, Identity theft, Mobile security, Privacy protection

Smartphone fingerprint scanners – are they a trap?

March 9, 2016

Via: Russel Edwards

Fingerprint scanners have had primitive aspects throughout history. The use of fingerprints (or more exactly handprints) in authentication dates back to 1858. Sir William Herschel, Chief Magistrate, introduced the identification via handprint for his civil service employees in India. It […]


Cloud security, Editorial, Privacy protection

Shadow data threat: how to solve a problem you didn’t know you had

March 2, 2016

Via: Russel Edwards

Shadow data is a logical derivative of shadow IT, an organizational issue that we have approached in a previous article on our MobileCurated publication. When “intra-enterprise information-technology solutions (…) compensate the busy schedule of the official IT department”, organizational data […]


Editorial, Privacy protection

Steganography – what are you actually seeing/listening to?

February 25, 2016

Via: Russel Edwards

We come into contact with numerous digital files every day, but some of them might not be what they seem at first glance; designated by the term “steganography”, the practice of concealing a message in a different cover-message precedes the […]


Data loss, Editorial, Hacker, Malware

How to fend off PoS malware in 2016

February 17, 2016

Via: Russel Edwards

One of early 2016’s cyber-security incidents consisted in the Hyatt hotel chain disclosure that almost half of its global payment processing systems endpoints have been infested with PoS malware, active for 6 months during 2015. A Kasperky Lab blog pointed […]


Cloud security, Editorial

Are you convinced you deleted that cloud file?

February 10, 2016

Via: Russel Edwards

Part of data privacy protection consists in being able to permanently delete data when necessary. Data deletion is another form of user control over sensitive or private information that has been at one moment entrusted upon a device or a […]


Access control, Data loss, Editorial

Visual hacking – is this a hot privacy issue in the workplace?

February 3, 2016

Via: Russel Edwards

Visual hacking, also dubbed shoulder surfing, is the act of accessing sensitive or relevant data by taking advantage of a physical position that allows the intruder to visualize another person’s device screen. Variations consist in determining the password from the […]


Editorial, Network security, Vulnerabilities

SCADA Systems security -just how important is it?

January 28, 2016

Via: Russel Edwards

SCADA stands for Supervisory Control and Data Acquisition, being the consecrated denomination since the 70s for the remote monitoring and control activities necessary in modern industrial activities. A subcategory of the general ICS (Industrial Control Systems), SCADA systems gained importance […]

View More  >