cybersecurity

Onfido Highlights Key Takeaways from WEF Authentication White Paper

Onfido Highlights Key Takeaways from WEF Authentication White Paper

Onfido has listed some of the key takeaways from the World Economic Forum’s new white paper on passwordless authentication. Onfido was one of the organizations that contributed to the paper, which was released during the recent WEF annual meeting in Davos. In the paper, the WEF noted that passwords are becoming more and more difficult…

Innovation and Coronavirus in This Week’s Top Mobile ID Stories

Innovation and Coronavirus in This Week’s Top Mobile ID Stories

Unfortunately, the coronavirus has spread even to this week’s roundup of Mobile ID World’s most popular stories; but the collection is otherwise full of innovation. Tinder, for example – the iconic dating app – is now embracing selfie-based authentication, with plans to get this functionality automated using Artificial Intelligence. It’s a means of verifying users…

ZenGo Warns About CurveBall Vulnerability on Windows 10 Devices

ZenGo Warns About CurveBall Vulnerability on Windows 10 Devices

ZenGo is warning users about a cryptography vulnerability that affects devices running an unpatched version of Windows 10. The CVE-2020–0601 vulnerability was first uncovered by the NSA, and was later picked up by ZenGo, which gave it the much catchier “CurveBall” moniker.   So how does CurveBall work? In plain terms, a hacker seeking to…

Fujitsu Allies with Upstream Security to Develop In-Car Threat Detection Platform

Fujitsu Allies with Upstream Security to Develop In-Car Threat Detection Platform

Fujitsu has teamed up with Upstream Security to develop a new security platform for the next generation of connected vehicles. Upstream Security is a smart car cybersecurity specialist, and has already developed a cloud-based automotive threat feed called Upstream C4. The new joint solution will blend Upstream C4 with Fujitsu’s data processing tech, as well…

Buguroo Sounds Alarm About Malicious Apps in Google Play Store

Buguroo Sounds Alarm About Malicious Apps in Google Play Store

Buguroo is warning consumers about three malicious applications that are currently available through Google Play. All three applications take advantage of the Android Binder vulnerability, and were first uncovered by Trend Micro researchers Ecular Xu and Joseph Chen. The offending applications are Camero, callCam, and FileCrypt Manager, all three of which should obviously be avoided. The first two are…

Dashlane Lists 2019’s Most Egregious Password Blunders

Dashlane Lists 2019’s Most Egregious Password Blunders

The credential management company (and FIDO Alliance member) Dashlane is once again calling attention to bad password practices with the release of its fourth annual “Worst Password Offenders” list. The list identifies individuals and organizations that made particularly high-profile password mistakes at some point in 2019. Some of the blunders are attributable to basic human…

GDPR and CCPA Will Force Companies to Meet Stringent ID Requirements: Deloitte

GDPR and CCPA Will Force Companies to Meet Stringent ID Requirements: Deloitte

Deloitte is trying to raise awareness about digital identity best practices while simultaneously calling attention to some of the main challenges facing businesses and other large organizations. The company notes that many organizations are still utilizing out of date legacy technology, and that those organizations will need to overcome institutional inertia in order to protect…

Oracle-ESI ThoughtLab Study Highlights Importance of Data for Smart Cities

Oracle-ESI ThoughtLab Study Highlights Importance of Data for Smart Cities

A survey conducted by Oracle and urban research consultancy ESI ThoughtLab was recently released highlighting the importance of cloud infrastructure in emerging Smart Cities. The report — titled “Building a Hyperconnected City” — surveyed 100 cities across the world, and was released at this year’s edition of the Smart Cities Expo World Congress. It projects…

Sontiq Upgrades IdentityForce App with Mobile Attack Control

Sontiq Upgrades IdentityForce App with Mobile Attack Control

Sontiq has upgraded the user interface of its IdentityForce Mobile App with the release of a new feature that notifies app users about potential threats to their smartphone. Dubbed Mobile Attack Control, the feature is built with technology from Sontiq’s Mobile Defense Suite. Mobile Attack Control will watch for cybersecurity threats like spyware, rogue apps,…

Secureworks Announces Partnership with Microsoft Defender Advanced Threat Protection

Secureworks Announces Partnership with Microsoft Defender Advanced Threat Protection

Secureworks and Microsoft have announced a partnership that aims to help joint customers detect and respond faster, more effectively and with more accuracy to advanced cyber threats. Red Cloak Threat Detection and Response (TDR), Secureworks’ software-as-a-service (SaaS) application, will use raw data collected from Microsoft’s Defender Advanced Threat Protection (ATP) platform to aid their own…

Trustonic and Lookout Team Up to Provide Better App Security

Trustonic and Lookout Team Up to Provide Better App Security

Lookout has partnered with Trustonic to expand the reach of its App Defense security platform. App Defense is an embeddable SDK that was built to reduce the threat of fraud and data breaches for consumer apps. The platform provides enterprise customers with more insight about malware and other security risks to their network. To that…

Jumio Receives Multiple Cyber Defense Awards

Jumio Receives Multiple Cyber Defense Awards

Jumio continues to race ahead on the 2019 awards circuit, taking home multiple prizes at the 2019 Cyber Defense Global Awards. The company was selected as the Leader in Authentication and Most Innovative in Biometrics, while Ervinna Lim was recognized in the individual Women in Cybersecurity category. Presented by Cyber Defense Magazine, the Cyber Defense…

Okta Releases Enterprise-Level SecurityInsights Platform

Okta Releases Enterprise-Level SecurityInsights Platform

Okta has released two new security products designed for large enterprises. HealthInsight helps administrators monitor and manage their networks, while UserInsight enlists rank-and-file employees to help spot potential cyberattacks. Both products are being offered under the broader SecurityInsights umbrella. So what do the new products do? HealthInsights provides recommendations for security best practices, and monitors…

Survey Data Illustrates Worrying Cybersecurity Trends for SMBs

Survey Data Illustrates Worrying Cybersecurity Trends for SMBs

“… the survey data suggests that cyberattacks have increased dramatically compared to a base year of 2016: in the US, attacks shot up from 55 percent to 76 percent over that period.” New survey research from the Ponemon Institute is further illustrating the rise of digital security threats and conflicting attitudes about security among small…

Thales and Verint Publish Comprehensive Cyberthreat Handbook

Thales and Verint Publish Comprehensive Cyberthreat Handbook

Thales and Verint have joined forces to publish The Cyberthreat Handbook, a comprehensive guide to the international cybersecurity landscape. The Handbook examines approximately 60 major groups and 490 individual attack campaigns, offering details about the motive, methods, and targets of the world’s most prominent cybercriminals. The two companies are hoping that the Handbook will help…

CyberPeace Institute Formed to Help the Victims of International Cyberattacks

CyberPeace Institute Formed to Help the Victims of International Cyberattacks

Some of the world’s leading cybersecurity and international policy experts have joined forces to create the CyberPeace Institute, a new NGO that will seek to mitigate the effects of major cyberattacks. Stéphane Duguin will come on as the organization’s CEO, while Marietje Schaake will serve as President and Chair of the Advisory Board. Together, they…

OneLogin Launches New Behavioral Risk Assessment Platform

OneLogin Launches New Behavioral Risk Assessment Platform

OneLogin has unveiled a pair of new cybersecurity products to help large enterprises calculate risk and reduce their reliance on text-based passwords. Vigilance AI is a risk assessment engine that uses machine learning and AI to determine the threat level of a given interaction, while SmartFactor Authentication uses behavioral analytics to verify people’s identities without…

Google Security Researchers Detail Major Attack Against iPhone Users

Google Security Researchers Detail Major Attack Against iPhone Users

Thousands of iPhone users may have had their devices hacked by malicious code found in a handful of websites, according to security researchers with Google. The security vulnerability has been revealed through a new blog post from Google’s Project Zero team member Ian Beer. The post describes a small group of websites that were likely…

IoT Botnet Targets Android Smart TVs and Set-Top Boxes

IoT Botnet Targets Android Smart TVs and Set-Top Boxes

The device security company WootCloud has uncovered an IoT botnet that targets Android set-top boxes and TVs. Dubbed “Ares”, the botnet specifically takes advantage of the Android Debug Bridge (ADB) infrastructure, which is a communications component that allows for the remote management of Android devices. WootCloud was able to discover the botnet with the help…

Pages
  • 1
  • 2