IoT security: when X.509 certificate authentication may not work
Security is complex and requires manufacturers building IoT devices to carefully analyze all software/hardware components in the solution. Some time ago, a DEFCON paper uncovered a huge amount of...
View ArticleAirWatch Connect: VMware boosts unified endpoint management, BYOD security...
Image: iStockphoto/scanrail On Tuesday, VMware detailed two new updates for existing products in unified endpoint management (UEM) and enterprise BYOD security at AirWatch Connect in Atlanta. VMware...
View ArticleCyber-Anything-As-A-Service: Should The Government Just Outsource Everything?
Agencies should be able to select and provision from a variety of cybersecurity services and capabilities to improve their overall effectiveness and efficiency. A day doesn’t go by without reading...
View ArticleIncreased interest in Managed Security at Light Reading NFV and Carrier SDN...
Increased interest in Managed Security at Light Reading NFV and Carrier SDN event October 4, 2016 ― by Mike O'Malley ― 0 Last week in Denver, Carriers discussed their plans to migrate their networks to...
View ArticleAndroid October Security Bulletin Fixes 78 Vulnerabilities
Google released on Monday, the Android October Security Bulletin, which this month addresses 78 security flaws, spread across two different patch levels. These patch levels organize security flaws...
View ArticleYour Security Concerns About Using Mobile Payment Are Valid
Despite the surge in mobile phone usage, and the innovative payment technologies that have come of age in mainstream usage, some consumers remain reluctant to completely embrace the latest payment...
View ArticleHow Users Perceive Security During the Checkout Flow (Incl. New 'Trust Seal'...
“People have lost everything you know, so I always check a 100 times before I purchase anything” , one of our test subject explained as she meticulously entered her credit card information. Indeed,...
View ArticleBanking industry group requests a way to disable forward secrecy in TLS 1.3
[ Date Prev ][ Date Next ][ Thread Prev ][ Thread Next ][ Date Index ][ Thread Index ] Re: [TLS] Industry Concerns about TLS 1.3 To : BITS Security < BITSSecurity at fsroundtable.org > Subject :...
View ArticleWhy the older generation is an attractive target for cybercriminals
People aged 55 and over are behaving insecurely online and often become the victim of fraud, according to Kaspersky Lab and B2B International. The survey questioned 12,546 Internet users across the...
View ArticleChecklist: IoT security and privacy
The Online Trust Alliance (OTA) released the consumer IoT security and privacy checklist, which contains steps consumers can take to help increase the security, privacy and safety of their connected...
View ArticleDrop, no, wait, deploy Anchore: Security code plunges into containers
Schrdinger's cat, as described in a famous thought experiment formulated to explain the indeterminacy of quantum states, sits in a steel box, at once alive and dead. It's conceit that depends on the...
View ArticleInsulin pump vulnerabilities could lead to overdose
Rapid7 Users of the Animas OneTouch Ping insulin pump system have been warned that security vulnerabilities in the device allow attackers to remotely deliver insulin doses. On Tuesday, researchers...
View ArticleWhy Access Management Is Security's Weak Link
BySamuel Greengard | Posted 2016-10-05 Email Why Access Management Is Security's Weak Link Weak and recycled passwords, along with the lack of a centralized password management policy and a credential...
View ArticleSecurity Think Tank: Making a game of phishing
Phishing continues to be the most popular route for cyber criminals, and was number one on the Top 10 Common Threat Techniques list in the (ISC) 2Global Information Workforce Study . Given that anyone...
View ArticleMastercard rolls out pay-by-selfie across Europe
AnalysisMaterCard’s "selfie pay" will be coming to Europe next year after trials in the US, Canada and the Netherlands. The financial services firm is rolling out technologies that will allow European...
View ArticleSMEs are the Achilles heel for Asean security
Small and medium-sized enterprises (SMEs) have become the preferred targets for cyber criminals. Not only are they often easy targets, but they offer a stepping stone to larger, more lucrative...
View ArticleNew security measures for conan package manager
In a previous post “Are C and C++ languages ready for the NPM debacle” , we described the approach of Conan package manager to security, which stands on: Namespaces. Packages are created on user...
View ArticleSecurity has become a byword for complexity. How is your organization adapting?
Watch the news on TV, read the newspaper or browse your favorite news site on the web and almost daily you find headlines of data breaches and other cybercrimes. With nearly 80% of data breaches being...
View ArticleDiabetics warned that insulin pump has security vulnerability
Johnson & Johnson has told people using one of its insulin pumps that there is a vulnerability in the device’s security that could allow hackers to gain access to the pump and make the device...
View ArticleSecurity budgets double but UK business still in the dark when it comes to...
According to PwC’s annual Global State of Information Security Survey 2017 , UK businesses are spending 6.2m on average (2015: 3m), and over one and a half times more than their global counterparts...
View Article