Access control, Privacy protection
July 28, 2016
Via: Security IntelligenceThe idea is a good one: Use the cellphone camera to take a selfie and employ it as another login authentication credential. Both MasterCard and LogMeOnce have introduced a type of selfie authentication. The MasterCard process is very straightforward: If […]
July 25, 2016
Via: Security WeekGoogle is planning new security features for the upcoming Android 7.0, including verified boot, which will prevent devices with a corrupt or modified boot image from booting. Android already has verified boot for cryptographic integrity checking to detect modifications to […]
Application security, Network security
July 22, 2016
Via: Threat PostIt’s a coin toss whether or not that Internet of Things device you depend on is secure. Those unacceptable 50/50 odds come from a survey by IOActive where technology professionals were asked about the security of connected devices from thermostats, […]
April 21, 2016
Via: Dark ReadingData breaches are the first stop for criminals with intentions to steal personally identifiable information. These tips show how to fight fraud while optimizing the customer experience. Increasingly, when consumers turn on the TV or check their phones for news, […]
April 1, 2016
Via: Security WeekResearchers have discovered a method that can be used to install malware on iOS devices by abusing the mobile device management (MDM) solutions used by many enterprises. Security firm Check Point has classified the issue as a vulnerability, which it […]
March 23, 2016
Via: Russel EdwardsThe future might replace passwords with mobile authentication. Recently the World Wide Web Consortium (W3C) announced on 17 February this year that it launched a new standards effort in view of a different web authentication method – “a more secure […]
March 7, 2016
Via: CSO OnlineOver the weekend, Apple customers who were looking for the latest version of Transmission, a popular BitTorrent client, likely downloaded a new family of Ransomware that targets OS X installations instead. The problem was discovered by Unit 42 researchers at […]
Network security, Privacy protection
March 7, 2016
Via: CIOA few days ago, we all awoke to the realization that Amazon had removed device encryption features from Fire OS 5—the operating system powering its Fire tablets—when it debuted last fall. After considerable controversy, though, the company says it will reintroduce […]
Application security, Vulnerabilities
January 15, 2016
Via: Help Net SecuritySmartwatches can be a perfectly useful and handy wearable device for some users, but it’s good to keep in mind that using them might mean opening yourself to an additional line of attack. As student Tony Beltramelli has demonstrated for […]
December 18, 2015
Via: Security IntelligenceOrganizations of all sorts are well aware of the need to manage access in order prevent fraud in physical facilities and avoid compromise of their assets. This holds true whether it is staff members at retail store, insurance agents, health […]
November 23, 2015
Via: CIOAn analysis of hundreds of publicly available firmware images for routers, DSL modems, VoIP phones, IP cameras and other embedded devices uncovered high-risk vulnerabilities in a significant number of them, pointing to poor security testing by manufacturers. The study was […]
October 28, 2015
Via: access-controlMasterCard on Monday unveiled secure payment prototypes in the form of rings, wristbands and car key fobs after working with NXP and Qualcomm to develop the chip-level technology. Products are expected to roll out in the U.S. next year. Capital […]
October 5, 2015
Via: vulnerabilities#google patched the latest round of #stagefright #vulnerabilities in #android, pushing them out as part of its latest over-the-air update to #nexus #devices. Stagefright 2.0, as it’s come to be known, affected the Stagefright media playback engine in Android and […]
October 1, 2015
Via: mobile-securityMore than a billion mobile #devices are affected by a set of two new critical vulnerabilities in #android‘s #stagefright code that can be exploited by an attacker to take complete control of a device, and as of Thursday patches are […]
September 22, 2015
Via: data-lossOver the past 10 years of #data breach history, 41 percent of breaches were caused not by hacking, but by device loss. Because of a particularly bad record of holding track of its #devices, the #healthcare industry has been responsible […]
August 31, 2015
Via: mobile-securityResearchers have discovered a new strain of iOS malware dubbed KeyRaider that targets jailbroken devices and has the ability to steal certificates, private keys, and Apple account information. The malware already has claimed the private Apple account data of more […]
August 5, 2015
Via: vulnerabilitiesLAS VEGAS–Google is changing the way that it updates its Nexus Android phones and will now send out monthly over-the-air updates to users. The first update is being pushed out today, and the company said that other Android handset manufacturers […]
July 1, 2015
Via: data-lossConnected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone users can be called “unmindful” — at least, as compared […]