The Latest in IT Security

minus
  • img
  • img
plus

Categories

THURSDAY, MAY 25, 2017

Featured

Archives

Latest Comments

Social Networks

First, not every online store uses 3D Secure protection, which means that not every transaction requires a confirmation SMS message with a code. Even the CVC code (three digits on the back of the card) is no guarantee against misuse — not all transactions require one. Also, hackers can intercept the SMS messages banks send and use the verification codes to gain full access to an account.

Read more ...

A lot of ads on the Internet promote easy ways to earn money. They tend to lead to fishy places — say, a post from an alleged mother of three who stays at home, earning several thousand dollars a day, and says you can do the same. But there are other ways to earn some easy money, too, that may seem much more plausible.

Read more ...

Research is expected to be unveiled today that challenges the industry’s current reliance on dynamic malware analysis as the best means of early detection of infections. Instead, researchers from the Georgia Institute of Technology posit that a better approach would be an analysis of network traffic to suspicious domains that would potentially cut detection times down by weeks or even months.

Read more ...

University researchers are warning that two features, not flaws, core to Google’s Android mobile operating system can be used together to launch clickjacking attacks to gain control of a target’s phone. The discovery was made by researchers at Georgia Institute of Technology, who call the research Cloak and Dagger.

Read more ...

The number of companies embracing biometrics for authentication is increasing; after introducing “selfie pay” last year, Mastercard is now testing fingerprint-authorized payments in South Africa, smartphones ask for fingerprints to be unlocked and speech recognition can control your Windows PC. Kinetic Energy Harvesting is the newest kid on the block, with technology developed by Data61 lab.

Read more ...