ATM-like cryptology aims to banish IDs and passwords

Finding a clever way to eliminate the use of passwords and user IDs entirely in a way that offers airtight security is, naturally, an identity technologist’s Holy Grail. CertiVox is the latest security Parsifal, debuting the open-source M-Pin Strong Au…

Read More >>

Bitcoin Foundation told to cease and desist

The Bitcoin Foundation has received a cease and desist letter from the California Department of Financial Institutions, alleging that it may be engaged in money transmissions without the requisite state license.

Read More >>

(ISC)² launches Cyber Warrior Scholarship for veterans

To help combat the widening of the gap between demand for and supply of cybersecurity professionals, the (ISC)²’s nonprofit arm has launched the U.S.A. Cyber Warrior Scholarship program, aimed at providing cybersecurity career training to qualified vet…

Read More >>

Chrome Vulnerable to Camjacking

Camjacking is clickjacking aimed at taking over the PC’s webcam – and although Adobe fixed the Flash vulnerability that allows it back in 2011, it lives on in the Flash implementations of Chrome and (not verified) IE10.

Read More >>

Malware swarming on P2P networks

For all of their benefits when it comes to enabling consumer communication, peer-to-peer networks have been notorious hideouts for pirated content and other things that wish to elude detection. They’re providing cover now for something else: malware.

Read More >>

Manchester City’s Scouting Database Compromised

75% of the UK’s Premier League football clubs, and 50% of clubs in the major European leagues use the services of Scout7 to provide solutions in player scouting, recruitment and information management. Manchester City’s private database has been breach…

Read More >>

Big Data causes big problems for security

For enterprises, the ability to detect data breaches within minutes is critical in preventing data loss, yet only 35% of firms stated they have the ability to do this. The culprit? An ever-escalating array of data sources stemming from virtualization, …

Read More >>