Latest News

Identity and Access Management

Samsung Galaxy S5 Fingerprint Hack Threatens Mobile Money

The Samsung Galaxy S5 has been on the market for only a matter of days, with its highly anticipated fingerprint scanner that will work with PayPal for mobile purchases. But there’s just one problem: German researchers have managed to fool the scanner with a latex fingerprint spoof.
23 April 2014

Samsung Joins FIDO Alliance, Creates FIDO-ready Galaxy S5 Samsung Joins FIDO Alliance, Creates FIDO-ready Galaxy S5

Samsung and PayPal have announced that they will be using the S3 Authentication Suite from Nok Nok Labs to leverage the emerging Fast IDentity Online (FIDO) standards for mobile payments.
22 April 2014

DBIR: POS Attacks Wane, Cyber-espionage is Up DBIR: POS Attacks Wane, Cyber-espionage is Up

In the latest Verizon Data Breach Investigations report (DBIR), Verizon researchers noted that 92% of the 100,000 security incidents analyzed over the past 10 years can be traced to nine basic attack patterns that vary from industry to industry.
22 April 2014

GAO Takes SEC to Task Over Vulnerable Financial Systems

Although the Securities and Exchange Commission (SEC) had implemented and made progress in strengthening its information security controls in the past few months, a report from the Government Accountability Office (GAO) has detailed that serious weaknesses remain when it comes to protecting the financial footprint.
21 April 2014

Michaels Confirms Card Breach Affecting 3 Million Customers Michaels Confirms Card Breach Affecting 3 Million Customers

Michaels Stores, the arts and crafts retail chain, has confirmed that it has been the victim of two separate, eight-month-long point-of-sale (PoS) attacks, exposing the credit and debit card data of as many as 3 million customers.
18 April 2014

Android Malware Repurposed to Thwart Two-factor Authentication Android Malware Repurposed to Thwart Two-factor Authentication

A malicious mobile application for Android that offers a range of espionage functions has now gone on sale in underground forums with a new trick: it’s being used by several banking trojans in an attempt to bypass the two-factor authentication method used by a range financial institutions.
17 April 2014

Netflix Scam Uses Elaborate Tech Support Ruse Netflix Scam Uses Elaborate Tech Support Ruse

Netflix is being used in a new phishing scam that lures victims into calling a “tech support” line, connecting to a live human that proceeds to probe around the user’s PC and lift information, behind an elaborate cover.
16 April 2014

More than Half of IT Workers Make Undocumented System Changes More than Half of IT Workers Make Undocumented System Changes

Frequent IT system changes without documentation or audit processes can cause system downtime and security breaches from internal and external threats, while decreasing overall operational efficiency. Yet, a new survey has revealed that a majority of IT professionals have made undocumented changes to their IT systems that no one else knows about.
16 April 2014

FBI's Massive Facial Recognition Database Raises Privacy Concerns FBI's Massive Facial Recognition Database Raises Privacy Concerns

The FBI is planning a new way to track and uncover potential threats – a massive facial recognition database. According to documents obtained by the Electronic Frontier Foundation, the Bureau's database will contain about 52 million biometric records by the end of the year, with plans to hold records on as many as 100 million people, or, roughly one-third of the country’s population. And that, of course, raises privacy concerns.
16 April 2014

Heartbleed May Have Led to Compromises at Mumsnet and Canada Revenue Agency Heartbleed May Have Led to Compromises at Mumsnet and Canada Revenue Agency

The scourge of Heartbleed, which may affect nearly two-thirds of websites, is continuing apace with data exposures at leading UK parenting site Mumsnet and the Canadian tax agency.
15 April 2014

Showing 1 - 10 of 978 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×