June 15, 2016
Via: Russel EdwardsThe December 2015 Ukraine cyber-attack that took control of the Prykarpattyaoblenergo Control Center (PCC) in the Ivano-Frankivsk region serves as study-case for all cyber-security researchers concerned with possible similar incidents in the US. The said APT attack was performed via […]
June 8, 2016
Via: Russel EdwardsSmartphones head towards touch-based continuous authentication – a type of permanent identity validation that is also passive, since it does not hinder in any way other human-phone interactions that may be taking place during the same time. That would eliminate […]
June 1, 2016
Via: Russel EdwardsWhile a recent report coming from the Institute of Electrical and Electronics Engineers shows that according to nearly 1400 tech enthusiasts (out of 2000 surveyed) mobile payment is sure to take over the payment market and clearly will surpass cash […]
May 25, 2016
Via: Russel EdwardsThe simplest way to describe homomorphic encryption would be the following: HE is the particular type of converting data into cipher text that allows this encrypted data to further get analyzed, permuted, associated to, and generally used into various computations […]
May 18, 2016
Via: Russel EdwardsIn-depth cyber defense sees the process of stopping attacks as being only half of the protection activity. Going to the roots of the incident or of the event and thus preparing the system in order to fend off future similar […]
May 11, 2016
Via: Russel EdwardsMetadata represents the context generated by and/or surrounding all digital communications, or the traces left by digital data during its processing and digital existence. Since it may be construed as a digital halo that reflects the characteristics of the user […]
May 5, 2016
Via: Russel EdwardsURL shorteners are right under our eyes. You may have noticed how for a while now many of the links shared online, especially (but not exclusively) on social networks started to look like “http://tinyurl.com/SomethingSomething”. Replace tinyurl with goo.gl or bit.ly […]
Application security, Editorial, Privacy protection
April 20, 2016
Via: Russel EdwardsLanguage-theoretic security or LangSec is a cyber-security approach that aims at eliminating cyber-risks from their programming roots. From this new perspective, all Internet cyber-risks originate in ad-hoc programming and untrusted inputs that form layer upon layer of coding with potential […]
Editorial, Vulnerabilities, Wireless security
April 13, 2016
Via: Russel EdwardsIt is an element of progress to have our mouse or keyboard wirelessly communicating with the computer, but have you ever wondered what dangers lie dormant in this efficient technology? A pair of Bastille researchers decided to verify just how […]
April 7, 2016
Via: Russel EdwardsIf the denomination of acoustic fingerprinting does not fully reveal the core concept, then maybe defining this type of fingerprinting as the mark/pattern based on a digital summary extracted from a short audio signal (summary that includes identifying, recognizing and […]
March 30, 2016
Via: Russel EdwardsThe Incident Response procedure (or IR strategy) is part of the cyber-security control measures. Following prevention and detection, the IR strategy is critical for the situations where the system has been affected by a breach or by another cyber-security event. […]
March 23, 2016
Via: Russel EdwardsThe future might replace passwords with mobile authentication. Recently the World Wide Web Consortium (W3C) announced on 17 February this year that it launched a new standards effort in view of a different web authentication method – “a more secure […]
Editorial, Email security, Phishing
March 16, 2016
Via: Russel EdwardsLately many cyber-security online sources warned enterprises of the business email compromise scheme (also known as the BEC scam), and they do this for a good reason: this fraud method has spiked over the last few months. BEC attacks are […]
Access control, Editorial, Identity theft, Mobile security, Privacy protection
March 9, 2016
Via: Russel EdwardsFingerprint scanners have had primitive aspects throughout history. The use of fingerprints (or more exactly handprints) in authentication dates back to 1858. Sir William Herschel, Chief Magistrate, introduced the identification via handprint for his civil service employees in India. It […]
Cloud security, Editorial, Privacy protection
March 2, 2016
Via: Russel EdwardsShadow data is a logical derivative of shadow IT, an organizational issue that we have approached in a previous article on our MobileCurated publication. When “intra-enterprise information-technology solutions (…) compensate the busy schedule of the official IT department”, organizational data […]
February 25, 2016
Via: Russel EdwardsWe come into contact with numerous digital files every day, but some of them might not be what they seem at first glance; designated by the term “steganography”, the practice of concealing a message in a different cover-message precedes the […]
Data loss, Editorial, Hacker, Malware
February 17, 2016
Via: Russel EdwardsOne of early 2016’s cyber-security incidents consisted in the Hyatt hotel chain disclosure that almost half of its global payment processing systems endpoints have been infested with PoS malware, active for 6 months during 2015. A Kasperky Lab blog pointed […]
February 10, 2016
Via: Russel EdwardsPart of data privacy protection consists in being able to permanently delete data when necessary. Data deletion is another form of user control over sensitive or private information that has been at one moment entrusted upon a device or a […]
Access control, Data loss, Editorial
February 3, 2016
Via: Russel EdwardsVisual hacking, also dubbed shoulder surfing, is the act of accessing sensitive or relevant data by taking advantage of a physical position that allows the intruder to visualize another person’s device screen. Variations consist in determining the password from the […]
Editorial, Network security, Vulnerabilities
January 28, 2016
Via: Russel EdwardsSCADA stands for Supervisory Control and Data Acquisition, being the consecrated denomination since the 70s for the remote monitoring and control activities necessary in modern industrial activities. A subcategory of the general ICS (Industrial Control Systems), SCADA systems gained importance […]
April 30, 2024
April 11, 2024
April 30, 2024