cybersecurity

Trusona Introduces Time-based One-Time Passwords

Trusona Introduces Time-based One-Time Passwords

Trusona has added a Time-based One-time Password (TOTP) feature to its passwordless security portfolio. The enterprise solution will enable two-step verification to provide a higher level of security for people logging into various work-related applications. The TOTP feature is compatible with virtually any platform that supports two-step verification, including Google, Slack, and Amazon Web Services.…

Nintendo Urges Gamers to Adopt Two-Factor Authentication

Nintendo Urges Gamers to Adopt Two-Factor Authentication

Security experts are advising gamers to implement two-factor authentication for their Nintendo accounts in response to a recent string of fraudulent attacks. The scam takes advantage of the fact that people can link their PayPal account to their Nintendo account to make purchases on the Nintendo Switch. The feature gives players a more convenient way…

Mastercard and RiskRecon Offer Free Cybersecurity Assessments to Healthcare Providers

Mastercard and RiskRecon Offer Free Cybersecurity Assessments to Healthcare Providers

RiskRecon and Mastercard are offering free cybersecurity rating assessments to all healthcare organizations. The offer is being made in collaboration with the Health Information Sharing and Analysis Center (H-ISAC) to help H-ISAC members protect their digital infrastructure during the COVID-19 pandemic. “The current pandemic is not only a serious health issue, but potentially a major…

Proposed SMS OTP Enhancement Gains Traction

Proposed SMS OTP Enhancement Gains Traction

A proposal from Apple engineers aimed at making SMS security more effective is making its way through the web development community. The idea, which was backed by Google in January, is essentially to link an SMS-based One Time Passcode directly to the website or other online entity sending it for user authentication. This means that…

Cyberattacks Increasingly Going Mobile: Report

Cyberattacks Increasingly Going Mobile: Report

LexisNexis Risk Solutions has released a new Cybercrime Report that analyzes the most noteworthy cyber trends from the second half of 2019. The report noted that cybercrime is an international operation, and that a growing percentage of cyberattacks are now carried out across mobile channels. LexisNexis Risk Solutions observed that every single fraud network analyzed…

Verizon Unveils New Cybersecurity and Digital Identity Solutions

Verizon Unveils New Cybersecurity and Digital Identity Solutions

Verizon is expanding its security portfolio with a collection of new products that were designed to help companies guard against various forms of cybercrime. The new offerings included Verizon Managed Detection and Response (MDR), Verizon Identity (VID), and Verizon Machine State Integrity, in addition to an upgraded Rapid Response Retainer. So what do the new…

Deep Instinct Raises $43 Million in Series C Funding

Deep Instinct Raises $43 Million in Series C Funding

Deep learning and cybersecurity company Deep Instinct has announced that it has raised $43 million in Series C funding in a round led by Millennium New Horizons, and with participation from the London-based Unbound, LG, and existing investor NVIDIA. This funding, along with previous rounds that saw the likes of Samsung and HP Inc. participating,…

Onfido Highlights Key Takeaways from WEF Authentication White Paper

Onfido Highlights Key Takeaways from WEF Authentication White Paper

Onfido has listed some of the key takeaways from the World Economic Forum’s new white paper on passwordless authentication. Onfido was one of the organizations that contributed to the paper, which was released during the recent WEF annual meeting in Davos. In the paper, the WEF noted that passwords are becoming more and more difficult…

Innovation and Coronavirus in This Week’s Top Mobile ID Stories

Innovation and Coronavirus in This Week’s Top Mobile ID Stories

Unfortunately, the coronavirus has spread even to this week’s roundup of Mobile ID World’s most popular stories; but the collection is otherwise full of innovation. Tinder, for example – the iconic dating app – is now embracing selfie-based authentication, with plans to get this functionality automated using Artificial Intelligence. It’s a means of verifying users…

ZenGo Warns About CurveBall Vulnerability on Windows 10 Devices

ZenGo Warns About CurveBall Vulnerability on Windows 10 Devices

ZenGo is warning users about a cryptography vulnerability that affects devices running an unpatched version of Windows 10. The CVE-2020–0601 vulnerability was first uncovered by the NSA, and was later picked up by ZenGo, which gave it the much catchier “CurveBall” moniker.   So how does CurveBall work? In plain terms, a hacker seeking to…

Fujitsu Allies with Upstream Security to Develop In-Car Threat Detection Platform

Fujitsu Allies with Upstream Security to Develop In-Car Threat Detection Platform

Fujitsu has teamed up with Upstream Security to develop a new security platform for the next generation of connected vehicles. Upstream Security is a smart car cybersecurity specialist, and has already developed a cloud-based automotive threat feed called Upstream C4. The new joint solution will blend Upstream C4 with Fujitsu’s data processing tech, as well…

Buguroo Sounds Alarm About Malicious Apps in Google Play Store

Buguroo Sounds Alarm About Malicious Apps in Google Play Store

Buguroo is warning consumers about three malicious applications that are currently available through Google Play. All three applications take advantage of the Android Binder vulnerability, and were first uncovered by Trend Micro researchers Ecular Xu and Joseph Chen. The offending applications are Camero, callCam, and FileCrypt Manager, all three of which should obviously be avoided. The first two are…

Dashlane Lists 2019’s Most Egregious Password Blunders

Dashlane Lists 2019’s Most Egregious Password Blunders

The credential management company (and FIDO Alliance member) Dashlane is once again calling attention to bad password practices with the release of its fourth annual “Worst Password Offenders” list. The list identifies individuals and organizations that made particularly high-profile password mistakes at some point in 2019. Some of the blunders are attributable to basic human…

GDPR and CCPA Will Force Companies to Meet Stringent ID Requirements: Deloitte

GDPR and CCPA Will Force Companies to Meet Stringent ID Requirements: Deloitte

Deloitte is trying to raise awareness about digital identity best practices while simultaneously calling attention to some of the main challenges facing businesses and other large organizations. The company notes that many organizations are still utilizing out of date legacy technology, and that those organizations will need to overcome institutional inertia in order to protect…

Oracle-ESI ThoughtLab Study Highlights Importance of Data for Smart Cities

Oracle-ESI ThoughtLab Study Highlights Importance of Data for Smart Cities

A survey conducted by Oracle and urban research consultancy ESI ThoughtLab was recently released highlighting the importance of cloud infrastructure in emerging Smart Cities. The report — titled “Building a Hyperconnected City” — surveyed 100 cities across the world, and was released at this year’s edition of the Smart Cities Expo World Congress. It projects…

Sontiq Upgrades IdentityForce App with Mobile Attack Control

Sontiq Upgrades IdentityForce App with Mobile Attack Control

Sontiq has upgraded the user interface of its IdentityForce Mobile App with the release of a new feature that notifies app users about potential threats to their smartphone. Dubbed Mobile Attack Control, the feature is built with technology from Sontiq’s Mobile Defense Suite. Mobile Attack Control will watch for cybersecurity threats like spyware, rogue apps,…

Secureworks Announces Partnership with Microsoft Defender Advanced Threat Protection

Secureworks Announces Partnership with Microsoft Defender Advanced Threat Protection

Secureworks and Microsoft have announced a partnership that aims to help joint customers detect and respond faster, more effectively and with more accuracy to advanced cyber threats. Red Cloak Threat Detection and Response (TDR), Secureworks’ software-as-a-service (SaaS) application, will use raw data collected from Microsoft’s Defender Advanced Threat Protection (ATP) platform to aid their own…

Pages
  • 1
  • 2