A fresh ransomware scheme is plaguing Android users by way of the well-known FakeAV malware, which has now made the leap from computers to mobile devices.
ATM-like cryptology aims to banish IDs and passwords
Finding a clever way to eliminate the use of passwords and user IDs entirely in a way that offers airtight security is, naturally, an identity technologist’s Holy Grail. CertiVox is the latest security Parsifal, debuting the open-source M-Pin Strong Au…
Bitcoin Foundation told to cease and desist
The Bitcoin Foundation has received a cease and desist letter from the California Department of Financial Institutions, alleging that it may be engaged in money transmissions without the requisite state license.
(ISC)² launches Cyber Warrior Scholarship for veterans
To help combat the widening of the gap between demand for and supply of cybersecurity professionals, the (ISC)²’s nonprofit arm has launched the U.S.A. Cyber Warrior Scholarship program, aimed at providing cybersecurity career training to qualified vet…
The effect of PRISM on Europe’s General Data Protection Regulation
PRISM is the US surveillance program that allows the NSA to gain access to the accounts of major US cloud services providers, including the accounts of non-US citizens. The GDPR is the proposed data protection law for the EU. The two are, on the surfac…
Chrome Vulnerable to Camjacking
Camjacking is clickjacking aimed at taking over the PC’s webcam – and although Adobe fixed the Flash vulnerability that allows it back in 2011, it lives on in the Flash implementations of Chrome and (not verified) IE10.
Google Glass privacy questioned by six countries and the EU
Led by Canada’s privacy commissioner Jennifer Stoddart, and enjoined by 36 provincial and international colleagues, Google has been invited to enter a dialogue with data protection authorities over the privacy issues around Google Glass.
Malware swarming on P2P networks
For all of their benefits when it comes to enabling consumer communication, peer-to-peer networks have been notorious hideouts for pirated content and other things that wish to elude detection. They’re providing cover now for something else: malware.
Manchester City’s Scouting Database Compromised
75% of the UK’s Premier League football clubs, and 50% of clubs in the major European leagues use the services of Scout7 to provide solutions in player scouting, recruitment and information management. Manchester City’s private database has been breach…
Big Data causes big problems for security
For enterprises, the ability to detect data breaches within minutes is critical in preventing data loss, yet only 35% of firms stated they have the ability to do this. The culprit? An ever-escalating array of data sources stemming from virtualization, …