The Latest in IT Security

minus
  • img
  • img
  • img
  • img
  • img
  • img
  • img
  • img
plus

Categories

WEDNESDAY, JULY 27, 2016

Featured

Archives

Latest Comments

Social Networks

Smartphones and phone-connected wearables are increasingly capable of collecting data on individuals and their environment via high-tech sensors. From heart rate, pulse, and body temperature to location, air quality, humidity and other relevant characteristics, the tiny elements embedded in our technology can sense and register quite an accurate image of inner and outer factors that […]

Read more ...

Despite initial concerns, smartphones equipped with Qualcomm modems are not vulnerable to a recently announced vulnerability that could potentially allow attackers to take over cellular network gear and consumer mobile devices. The vulnerability was discovered in ASN1C, a popular compiler that produces C code for parsing ASN.1 encoded data. Abstract Syntax Notation One (ASN.1) is […]

Read more ...

The National Institute for Standards and Technology (NIST) has released a Digital Authentication Guideline draft proposing that all services abandon SMS-based two-factor authentication and use tokens and software cryptographic authenticators. Because messages can be redirected to a VoIP service and not an actual mobile number, NIST believes SMS-enabled two-factor authentication is vulnerable to attacks. A […]

Read more ...

Most companies fail to secure the “keys to the kingdom,” according to a new benchmark survey. Last week, privileged account management (PAM) specialist Thycotic and research firm Cybersecurity Ventures released their 2016 State of Privileged Account Management security report, based on the responses of more than 500 IT security professionals who have participated in the […]

Read more ...

The Department of Health and Human Services hit the University of Mississippi Medical Center (UMMC) with a $2.75 million fine over a health data breach, its second major privacy action in a week.

Read more ...