Wireless Security

Af7244bb99debb4a1152fa49a993a05c

16 Million Mobile Devices Infected With Malware in 2014: Alcatel-Lucent

February 16, 2015 Added by:Eduard Kovacs

A new report published by Alcatel-Lucent’s Motive Security Labs estimates that 16 million mobile devices were infected with malware in 2014.

Comments  (4)

F45df53d99605d46f5ae32b7bed9fe22

Anthem Breach: How Hackers Stole Credentials and Why Two-Factor Authentication May Help Prevent Future Phishing Scams

February 09, 2015 Added by:Thu Pham

If the Anthem attack was carried out as the result of using a single password, their access security wasn’t up to industry standards. Two-factor authentication may have thwarted attacks by requiring the use of a personal device to verify the identity of a system administrator or other technical employee with access to their database of millions of sensitive records.

Comments  (3)

65be44ae7088566069cc3bef454174a7

Data Collection Must be Limited for Internet of Things Privacy

February 02, 2015 Added by:Rebecca Herold

I know people use and love the wearable fitness devices and credit them with helping them to get into better shape. However, consumers concerned about privacy want to know about all the data the devices are collecting, along with how it is being used and shared, before using the devices.

Comments  (3)

Ebb72d4bfba370aecb29bc7519c9dac2

Defeat The Casual Attacker First!!

January 28, 2015 Added by:Anton Chuvakin

I have not done a philosophical security blog post for a long time – and now I was suddenly inspired to write one while installing – rather, replacing with an HD version – security cameras at my house.

Comments  (1)

Af7244bb99debb4a1152fa49a993a05c

Google Says It’s Not Practical to Fix Flaws in Pre-KitKat Android

January 27, 2015 Added by:Eduard Kovacs

Researchers reported earlier this month that Google was no longer patching vulnerabilities affecting the WebView component in Android Jelly Bean (4.3) and prior.

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

British Prime Minister Wants to Ban Online Messaging Apps Including WhatsApp

January 13, 2015 Added by:Pierluigi Paganini

Prime Minister Cameron said that the UK would pursue banning encrypted messaging apps if the Intelligence was not given access to the communications.

Comments  (9)

F45df53d99605d46f5ae32b7bed9fe22

Does Your Valuable Data Belong to Hackers?

January 05, 2015 Added by:Thu Pham

Every organization, regardless of size, is comprised of a variety of sensitive data - from HR and payroll handling medical, financial and personally identifiable employee data to your precious intellectual property. And each of these data types can be sold for a price on the black market, making them valuable to attackers financially as well as for blackmail purposes.

Comments  (6)

65be44ae7088566069cc3bef454174a7

Addressing Mobile Risks in 2015

January 01, 2015 Added by:Rebecca Herold

We are literally putting more responsibility for the security of our business assets into the hands of our employees.

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Hacking 4G USB modems and SIM Card via SMS

December 31, 2014 Added by:Pierluigi Paganini

A group of experts managed to uncover USB modem vulnerabilities that allow a potential attacker to gain full control of the connected system.

Comments  (0)

C58e402c41b06ade1da4ce5bab5e19aa

Security in 2015: The Internet Becomes the Corporate Network Perimeter

December 05, 2014 Added by:Paul Lipman

The cloud has been widely hailed as the most disruptive force in modern business. Indeed, the world is in the midst of fundamentally profound transformations, enabled by the cloud, in the ways in which we access and interact with data and applications. Unfortunately, the security industry has not kept pace with these transformational trends, necessitating an equally profound change in the way we s...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Phones, Phablets and Clouds - Securing Today’s New Infrastructure

December 03, 2014 Added by:Steve Durbin

Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Countless organizations are still playing catch up – Bring Your Own Device (BYOD) polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workp...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Can Hackers Get Past Your Password?

November 05, 2014 Added by:Steve Durbin

Password-based authentication is easy and familiar for customers, and is initially inexpensive for organizations to deploy at scale. But, while password-based authentication may be appropriate in some instances, it is no longer suitable for the wide range of services where it is currently being used.

Comments  (2)

7ddc1f3000a13e4dfec28074e9e7b658

Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls

November 04, 2014 Added by:Electronic Frontier Foundation

In an effort to better serve advertisers, Verizon Wireless has been silently modifying its users' web traffic on its network to inject a cookie-like tracker.

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Cracking Wifi Passwords With Kali Linux

October 29, 2014 Added by:Javvad Malik

In under a dozen commands you can potentially grab a wifi password, which is script kiddie territory. The real question goes a lot deeper what can be done with this information?

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

NIST warns on Zero-Day flaw in Samsung FindMyMobile

October 27, 2014 Added by:Pierluigi Paganini

The US-CERT/NIST is warning of the presence of a zero-day flaw that affects the Samsung FindMyMobile web service (CVE-2014-8346).

Comments  (3)

E595c1d49bf4a26f8e14ce59812af80e

When Remote Access Becomes Your Enemy

October 16, 2014 Added by:Patrick Oliver Graf

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »