Editorial

Acoustic fingerprinting, suspended between privacy and marketing tech
Editorial Acoustic fingerprinting, suspended between privacy and marketing tech

If the denomination of acoustic fingerprinting does not fully reveal the core concept, then maybe defining this type of fingerprinting as the mark/pattern based on a digital summary extracted from a short audio signal (summary that includes identifying, recognizing and tracking the audio source)

Have you considered improving your IR strategy?
Editorial Have you considered improving your IR strategy?

The Incident Response procedure (or IR strategy) is part of the cyber-security control measures. Following prevention and detection, the IR strategy is critical for the situations where the system has been affected by a breach or by another cyber-security event. A coherent IR plan should comprise

Password? No, thanks, I have mobile authentication!
Editorial Password? No, thanks, I have mobile authentication!

The future might replace passwords with mobile authentication. Recently the World Wide Web Consortium (W3C) announced on 17 February this year that it launched a new standards effort in view of a different web authentication method  – “a more secure and flexible alternative to password-based log-

How to escape the BEC scam – when authority emails equal fraud
Editorial How to escape the BEC scam – when authority emails equal fraud

Lately many cyber-security online sources warned enterprises of the business email compromise scheme (also known as the BEC scam), and they do this for a good reason: this fraud method has spiked over the last few months. BEC attacks are a particular type of spear phishing, and four organizations

Smartphone fingerprint scanners – are they a trap?
Editorial Smartphone fingerprint scanners – are they a trap?

Fingerprint scanners have had primitive aspects throughout history. The use of fingerprints (or more exactly handprints) in authentication dates back to 1858. Sir William Herschel, Chief Magistrate, introduced the identification via handprint for his civil service employees in India. It took about

Shadow data threat: how to solve a problem you didn’t know you had
Editorial Shadow data threat: how to solve a problem you didn’t know you had

Shadow data is a logical derivative of shadow IT, an organizational issue that we have approached in a previous article on our MobileCurated publication. When “intra-enterprise information-technology solutions (…) compensate the busy schedule of the official IT department”, organizational data meets

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later