When Apple unveils its new iPhone models Tuesday, one particularly persistent rumor may come true - that at least one model of the new hardware will feature a built-in fingerprint scanner.
Archives - September 2013
Four out of five consumers have been “locked out” of websites due to not remembering log-ins - and over a fifth rely on password resets “on a regular basis,” according to a survey conducted by Ping Identity.
Baby monitors which shipped with security flaws that allowed hackers to watch and listen to babies from remote locations have led to an FTC complaint against the company responsible, Trendnet.
Win32/Spy.Hesperbot is a new banking trojan that has been targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. For more information about its malware spreading campaigns and victims, refer to our first blog post. In this post we’ll cover the technical details of the malware, including the overall architecture, as well as the mobile component.
Internet users are becoming more savvy about keeping their private data safe - but many have already fallen victim to crime and scams, a study by the Pew Research Institute’s Internet Project has found. One in five (21%) of internet users have had an email or social networking account compromised or taken over without their permission.
BlackBerry has signed up to FIDO (Fast IDentity Online) Alliance – a group which is seeking to establish new methods to identify people quickly and safely, rather than relying on passwords for mobile security. FIDO is supported by internet giants such as Google and PayPal and is investigating alternative authentication technologies such as NFC chips, biometrics and one-time passwords, with a view to creating a standards-based system for passwordless authentication.
A new and effective banking trojan has been discovered targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. It uses very credible-looking phishing-like campaigns, related to trustworthy organizations, to lure victims into running the malware.
Performing a “cyber spring clean” can be time-consuming - but many of us have a few weaknesses we can tighten up in two minutes or less. Here are a few "instant fixes" for problems you might have overlooked...
“Rogue cellular devices” could allow attackers to block texts, intercept calls – and “black out” areas
Attacks which “hijack” calls and block phone services for individual phone users or even whole city areas are possible, using a “rogue device” to attack cellular networks, according to Berlin researchers.
Your unique heartbeat could offer a secure and easy-to-use alternative to remembering dozens of long, complex passwords, according to Bionym, who launched a new “password wristband” today.
A bug which allowed any Facebook user to delete photos from any other user’s page without their knowledge has earned its discoverer $12,500 under Facebook’s “bug bounty” program - more than 10 times the average payout.
Four out of ten employees who use their own mobile devices at work fail to use basic security measures - and the trend for "BYOD" could be putting company information at risk, according to a new survey.
Two independent Italian security researchers have investigated the business behind Facebook spam - and estimate that the trade is worth around $200m a year.