Highlights from the past seven days in information security include an Android banking trojan that not only has the ability to pose as Flash Player, but can also bypass 2FA security as well.
Archives - March 2016
The UK’s communications regulator Ofcom is investigating what could be the biggest data breach in its history. The incident was caused internally – former employee had been surreptitiously gathering data over a six-year period.
In an era when children are becoming digital natives, using and understanding technology from an early age, safety risks that have existed for some time could also affect them, if we fail to take the necessary precautions.
Android smartphones offering biometric security can be tricked into unlocking with 2D fingerprints – and all you need is an Inkjet printer.
This malware masquerades as Flash Player, behaves like a screen locker, and can bypass two-factor authentication. This combination of features turns it into a powerful tool for stealing money from victims’ bank accounts.
Cybercrime is now the second most reported economic crime and has affected at least a third of organizations in the past 24 months, yet many businesses are still underprepared.
In 1942 six mathematicians were selected to program a machine that would help the US army calculate complex wartime ballistics tables. They helped to create ENIAC – one of the world’s first ever electronic computers. They were also all women.
Verizon Wireless will pay a $1.35 million fine after the company inserted undeletable 'supercookies' into its users' browsing sessions without consent.
Parisa Tabriz may not be a household name, but it's only a matter of time. We take a look at Google's Security Princess, who is changing the face of tech.
If you fail to take proper care, it would be all too easy to type your password into a phishing site and hand control of your website over to a online criminal gang.
New ransomware infecting Apple OS X surfaced on March 4th, 2016, with the emergence of KeRanger. The first inkling of trouble came at the weekend.
Welcome to this week’s security review, in which we'll be assessing the buzzword-laden security startups of RSA, and rounding up the week's biggest stories.
Keeping your family safe online is not about making a one-off investment in a security solution. It requires a proactive approach, once every two to three months for example, where you tick off a checklist. Here are five things to keep on top of.
Most businesses now recognize internet security as a real concern, yet new research has found that just 1 in 7 security chiefs report directly to their CEO.
Yes or no, will your next phone have quantum cryptographic 2FA? If one of the vendors here at RSA has anything to do with it, the answer will be 'yes' says ESET's Cameron Camp.
A new vulnerability could leave as many as one-third of HTTPS websites open to decryption.
This year RSA is drowning in buzzword-laden security startups. If you’ve got a next-gen cloud-enabled startup that catches 100% of zero days no has even thought of yet, there’s an RSA booth for you. No track record? No problem. Not sure whether it’s hardware or software? No problem. The problem is that real security is really hard.
It is important to understand how and when an agile approach to deploying your network defenses in real-time should be performed, says ESET's Cameron Camp.
Less than a month after it “renewed a consumer alert” for phishing scams, the Internal Revenue Service (IRS) in the US has delivered another warning aimed this time at payroll and human resources professionals.
Is there such a thing as security technology that is too good? ESET's Cameron Camp, who is in attendance at RSA, discusses further.