cybersecurity

Proposed SMS OTP Enhancement Gains Traction

Proposed SMS OTP Enhancement Gains Traction

A proposal from Apple engineers aimed at making SMS security more effective is making its way through the web development community. The idea, which was backed by Google in January, is essentially to link an SMS-based One Time Passcode directly to the website or other online entity sending it for user authentication. This means that…

Cyberattacks Increasingly Going Mobile: Report

Cyberattacks Increasingly Going Mobile: Report

LexisNexis Risk Solutions has released a new Cybercrime Report that analyzes the most noteworthy cyber trends from the second half of 2019. The report noted that cybercrime is an international operation, and that a growing percentage of cyberattacks are now carried out across mobile channels. LexisNexis Risk Solutions observed that every single fraud network analyzed…

Verizon Unveils New Cybersecurity and Digital Identity Solutions

Verizon Unveils New Cybersecurity and Digital Identity Solutions

Verizon is expanding its security portfolio with a collection of new products that were designed to help companies guard against various forms of cybercrime. The new offerings included Verizon Managed Detection and Response (MDR), Verizon Identity (VID), and Verizon Machine State Integrity, in addition to an upgraded Rapid Response Retainer. So what do the new…

Deep Instinct Raises $43 Million in Series C Funding

Deep Instinct Raises $43 Million in Series C Funding

Deep learning and cybersecurity company Deep Instinct has announced that it has raised $43 million in Series C funding in a round led by Millennium New Horizons, and with participation from the London-based Unbound, LG, and existing investor NVIDIA. This funding, along with previous rounds that saw the likes of Samsung and HP Inc. participating,…

Onfido Highlights Key Takeaways from WEF Authentication White Paper

Onfido Highlights Key Takeaways from WEF Authentication White Paper

Onfido has listed some of the key takeaways from the World Economic Forum’s new white paper on passwordless authentication. Onfido was one of the organizations that contributed to the paper, which was released during the recent WEF annual meeting in Davos. In the paper, the WEF noted that passwords are becoming more and more difficult…

Innovation and Coronavirus in This Week’s Top Mobile ID Stories

Innovation and Coronavirus in This Week’s Top Mobile ID Stories

Unfortunately, the coronavirus has spread even to this week’s roundup of Mobile ID World’s most popular stories; but the collection is otherwise full of innovation. Tinder, for example – the iconic dating app – is now embracing selfie-based authentication, with plans to get this functionality automated using Artificial Intelligence. It’s a means of verifying users…

ZenGo Warns About CurveBall Vulnerability on Windows 10 Devices

ZenGo Warns About CurveBall Vulnerability on Windows 10 Devices

ZenGo is warning users about a cryptography vulnerability that affects devices running an unpatched version of Windows 10. The CVE-2020–0601 vulnerability was first uncovered by the NSA, and was later picked up by ZenGo, which gave it the much catchier “CurveBall” moniker.   So how does CurveBall work? In plain terms, a hacker seeking to…

Fujitsu Allies with Upstream Security to Develop In-Car Threat Detection Platform

Fujitsu Allies with Upstream Security to Develop In-Car Threat Detection Platform

Fujitsu has teamed up with Upstream Security to develop a new security platform for the next generation of connected vehicles. Upstream Security is a smart car cybersecurity specialist, and has already developed a cloud-based automotive threat feed called Upstream C4. The new joint solution will blend Upstream C4 with Fujitsu’s data processing tech, as well…

Buguroo Sounds Alarm About Malicious Apps in Google Play Store

Buguroo Sounds Alarm About Malicious Apps in Google Play Store

Buguroo is warning consumers about three malicious applications that are currently available through Google Play. All three applications take advantage of the Android Binder vulnerability, and were first uncovered by Trend Micro researchers Ecular Xu and Joseph Chen. The offending applications are Camero, callCam, and FileCrypt Manager, all three of which should obviously be avoided. The first two are…

Dashlane Lists 2019’s Most Egregious Password Blunders

Dashlane Lists 2019’s Most Egregious Password Blunders

The credential management company (and FIDO Alliance member) Dashlane is once again calling attention to bad password practices with the release of its fourth annual “Worst Password Offenders” list. The list identifies individuals and organizations that made particularly high-profile password mistakes at some point in 2019. Some of the blunders are attributable to basic human…

GDPR and CCPA Will Force Companies to Meet Stringent ID Requirements: Deloitte

GDPR and CCPA Will Force Companies to Meet Stringent ID Requirements: Deloitte

Deloitte is trying to raise awareness about digital identity best practices while simultaneously calling attention to some of the main challenges facing businesses and other large organizations. The company notes that many organizations are still utilizing out of date legacy technology, and that those organizations will need to overcome institutional inertia in order to protect…

Oracle-ESI ThoughtLab Study Highlights Importance of Data for Smart Cities

Oracle-ESI ThoughtLab Study Highlights Importance of Data for Smart Cities

A survey conducted by Oracle and urban research consultancy ESI ThoughtLab was recently released highlighting the importance of cloud infrastructure in emerging Smart Cities. The report — titled “Building a Hyperconnected City” — surveyed 100 cities across the world, and was released at this year’s edition of the Smart Cities Expo World Congress. It projects…

Sontiq Upgrades IdentityForce App with Mobile Attack Control

Sontiq Upgrades IdentityForce App with Mobile Attack Control

Sontiq has upgraded the user interface of its IdentityForce Mobile App with the release of a new feature that notifies app users about potential threats to their smartphone. Dubbed Mobile Attack Control, the feature is built with technology from Sontiq’s Mobile Defense Suite. Mobile Attack Control will watch for cybersecurity threats like spyware, rogue apps,…

Secureworks Announces Partnership with Microsoft Defender Advanced Threat Protection

Secureworks Announces Partnership with Microsoft Defender Advanced Threat Protection

Secureworks and Microsoft have announced a partnership that aims to help joint customers detect and respond faster, more effectively and with more accuracy to advanced cyber threats. Red Cloak Threat Detection and Response (TDR), Secureworks’ software-as-a-service (SaaS) application, will use raw data collected from Microsoft’s Defender Advanced Threat Protection (ATP) platform to aid their own…

Trustonic and Lookout Team Up to Provide Better App Security

Trustonic and Lookout Team Up to Provide Better App Security

Lookout has partnered with Trustonic to expand the reach of its App Defense security platform. App Defense is an embeddable SDK that was built to reduce the threat of fraud and data breaches for consumer apps. The platform provides enterprise customers with more insight about malware and other security risks to their network. To that…

Jumio Receives Multiple Cyber Defense Awards

Jumio Receives Multiple Cyber Defense Awards

Jumio continues to race ahead on the 2019 awards circuit, taking home multiple prizes at the 2019 Cyber Defense Global Awards. The company was selected as the Leader in Authentication and Most Innovative in Biometrics, while Ervinna Lim was recognized in the individual Women in Cybersecurity category. Presented by Cyber Defense Magazine, the Cyber Defense…

Okta Releases Enterprise-Level SecurityInsights Platform

Okta Releases Enterprise-Level SecurityInsights Platform

Okta has released two new security products designed for large enterprises. HealthInsight helps administrators monitor and manage their networks, while UserInsight enlists rank-and-file employees to help spot potential cyberattacks. Both products are being offered under the broader SecurityInsights umbrella. So what do the new products do? HealthInsights provides recommendations for security best practices, and monitors…

Survey Data Illustrates Worrying Cybersecurity Trends for SMBs

Survey Data Illustrates Worrying Cybersecurity Trends for SMBs

“… the survey data suggests that cyberattacks have increased dramatically compared to a base year of 2016: in the US, attacks shot up from 55 percent to 76 percent over that period.” New survey research from the Ponemon Institute is further illustrating the rise of digital security threats and conflicting attitudes about security among small…

Thales and Verint Publish Comprehensive Cyberthreat Handbook

Thales and Verint Publish Comprehensive Cyberthreat Handbook

Thales and Verint have joined forces to publish The Cyberthreat Handbook, a comprehensive guide to the international cybersecurity landscape. The Handbook examines approximately 60 major groups and 490 individual attack campaigns, offering details about the motive, methods, and targets of the world’s most prominent cybercriminals. The two companies are hoping that the Handbook will help…

Pages
  • 1
  • 2