Wednesday, December 12, 2018

ASPIRE to keep protecting billions of Android users

Posted by Billy Lau and René Mayrhofer, Android Security & Privacy TeamCustomization is one of Android's greatest strengths. Android's open source nature has enabled thousands of device types that cover...

Quora Hacked – What Now ? – Internet Security Blog – Hackology

I am part of the 100 Million Quora users who got an email telling that Quora system was compromised leading to a 100 Million User Data Hack which might also...

KoffeyMaker: notebook vs. ATM | Securelist

Despite CCTV and the risk of being caught by security staff, attacks on ATMs using a direct connection — so-called black box attacks — are still popular with cybercriminals. The...

#NICEK12: Digital Detox for Cyber Awareness

In addition to sessions on cryptography and teaching kids how to code, the 2018 NICE K12 Cybersecurity Education Conference also focused on teaching young people how to protect their identities...

M2M protocols can be abused to attack IoT and IIoT systemsSecurity Affairs

Security experts from Trend Micro discovered that some machine-to-machine (M2M) protocols can be abused to attack IoT and industrial Internet of Things (IIoT)...

How Federal CIO Suzette Kent Is Reimagining the Cyber Workforce

About the Author Chris Townsend Vice President, Federal, Symantec Chris leads a...

What is physical security? How to keep your facilities and devices safe from on-site...

Physical security definitionPhysical security is the protection of people, property, and physical assets from actions and events that could cause damage or loss. Though often overlooked in favor of cybersecurity,...

Fitness-tracking apps caught misusing Touch ID to steal money from iPhone users

Reddit users have shined a spotlight on an underhand user interface trick used by certain iOS fitness apps to trick iPhone owners into approving unwanted in-app payments with Touch ID. As...

When Scammers Become Hackers – Internet Security Blog – Hackology

A word known by everyone and not always in good term is ‘Hacking’ and ‘Hackers’. Those who are not technically inclined would be familiar with the word I mentioned and...

Kaspersky Security Bulletin 2018. Top security stories

Introduction The internet is now woven into the fabric of our lives. Many people routinely bank, shop and socialize online and the internet is the lifeblood of commercial organizations. The dependence...

LATEST NEWS

MUST READ