Advertisement
Top

Tag: devices


Access control, Privacy protection

The Rise of the Selfie Authentication as a New Security Factor

July 28, 2016

Via: Security Intelligence

The idea is a good one: Use the cellphone camera to take a selfie and employ it as another login authentication credential. Both MasterCard and LogMeOnce have introduced a type of selfie authentication. The MasterCard process is very straightforward: If […]


Mobile security

Android 7.0 to Strictly Enforce Verified Boot

July 25, 2016

Via: Security Week

Google is planning new security features for the upcoming Android 7.0, including verified boot, which will prevent devices with a corrupt or modified boot image from booting. Android already has verified boot for cryptographic integrity checking to detect modifications to […]


Application security, Network security

IoT Insecurity: Pinpointing the Problems

July 22, 2016

Via: Threat Post

It’s a coin toss whether or not that Internet of Things device you depend on is secure. Those unacceptable 50/50 odds come from a survey by IOActive where technology professionals were asked about the security of connected devices from thermostats, […]


Data loss

Device Advice: Keeping Fraudsters From Consumer Info

April 21, 2016

Via: Dark Reading

Data breaches are the first stop for criminals with intentions to steal personally identifiable information. These tips show how to fight fraud while optimizing the customer experience. Increasingly, when consumers turn on the TV or check their phones for news, […]


Mobile security

Attackers Can Install Malware on iOS via MDM Solutions

April 1, 2016

Via: Security Week

Researchers have discovered a method that can be used to install malware on iOS devices by abusing the mobile device management (MDM) solutions used by many enterprises. Security firm Check Point has classified the issue as a vulnerability, which it […]


Access control, Editorial

Password? No, thanks, I have mobile authentication!

March 23, 2016

Via: Russel Edwards

The future might replace passwords with mobile authentication. Recently the World Wide Web Consortium (W3C) announced on 17 February this year that it launched a new standards effort in view of a different web authentication method  – “a more secure […]


Malware

Ransomware developers target Apple customers

March 7, 2016

Via: CSO Online

Over the weekend, Apple customers who were looking for the latest version of Transmission, a popular BitTorrent client, likely downloaded a new family of Ransomware that targets OS X installations instead. The problem was discovered by Unit 42 researchers at […]


Network security, Privacy protection

Amazon’s bringing encryption back to its Fire tablets

March 7, 2016

Via: CIO

A few days ago, we all awoke to the realization that Amazon had removed device encryption features from Fire OS 5—the operating system powering its Fire tablets—when it debuted last fall. After considerable controversy, though, the company says it will reintroduce […]


Application security, Vulnerabilities

Your smartwatch can give away your payment card's PIN code

January 15, 2016

Via: Help Net Security

Smartwatches can be a perfectly useful and handy wearable device for some users, but it’s good to keep in mind that using them might mean opening yourself to an additional line of attack. As student Tony Beltramelli has demonstrated for […]


Mobile security

Manage Mobile Device Fraud Without Succumbing to Mobilephobia

December 18, 2015

Via: Security Intelligence

Organizations of all sorts are well aware of the need to manage access in order prevent fraud in physical facilities and avoid compromise of their assets. This holds true whether it is staff members at retail store, insurance agents, health […]


Vulnerabilities

Many embedded devices ship without adequate security tests, analysis shows

November 23, 2015

Via: CIO

An analysis of hundreds of publicly available firmware images for routers, DSL modems, VoIP phones, IP cameras and other embedded devices uncovered high-risk vulnerabilities in a significant number of them, pointing to poor security testing by manufacturers. The study was […]


Access control

MasterCard unveils secure-payment prototypes for 2016 delivery

October 28, 2015

Via: access-control

MasterCard on Monday unveiled secure payment prototypes in the form of rings, wristbands and car key fobs after working with NXP and Qualcomm to develop the chip-level technology. Products are expected to roll out in the U.S. next year. Capital […]


Vulnerabilities

Google Pushes Stagefright 2.0 Patches to Nexus Devices

October 5, 2015

Via: vulnerabilities

#google patched the latest round of #stagefright #vulnerabilities in #android, pushing them out as part of its latest over-the-air update to #nexus #devices. Stagefright 2.0, as it’s come to be known, affected the Stagefright media playback engine in Android and […]


Mobile security

More than a billion Android devices vulnerable to new Stagefright bugs

October 1, 2015

Via: mobile-security

More than a billion mobile #devices are affected by a set of two new critical vulnerabilities in #android‘s #stagefright code that can be exploited by an attacker to take complete control of a device, and as of Thursday patches are […]


Data loss

Healthcare Biggest Offender In 10 Years Of Data Breaches

September 22, 2015

Via: data-loss

Over the past 10 years of #data breach history, 41 percent of breaches were caused not by hacking, but by device loss. Because of a particularly bad record of holding track of its #devices, the #healthcare industry has been responsible […]


Mobile security

KeyRaider Malware Steals Certificates, Keys and Account Data From Jailbroken iPhones

August 31, 2015

Via: mobile-security

Researchers have discovered a new strain of iOS malware dubbed KeyRaider that targets jailbroken devices and has the ability to steal certificates, private keys, and Apple account information. The malware already has claimed the private Apple account data of more […]


Vulnerabilities

Google Plans Monthly Security Updates for Nexus Phones

August 5, 2015

Via: vulnerabilities

LAS VEGAS–Google is changing the way that it updates its Nexus Android phones and will now send out monthly over-the-air updates to users. The first update is being pushed out today, and the company said that other Android handset manufacturers […]


Data loss

How to survive in the ‘Digital Amnesia’ world

July 1, 2015

Via: data-loss

Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone users can be called “unmindful” — at least, as compared […]