Quantcast

Security Articles

iPhone 5s Touch ID Fingerprint Technology Apparently Hacked In Just A Day [Video] iPhone 5s Touch ID Fingerprint Technology Apparently Hacked In Just A Day [Video]
· 1

Well, that didn’t take long. The iPhone 5s was released on Friday with its Touch ID fingerprint-scanning security technology, and it looks as though it may have already been hacked. In fact, it had already been done by Saturday, when …

IBM Completes Trusteer Acquisition IBM Completes Trusteer Acquisition

IBM has completed its acquisition of Trusteer, first announced last month. “The way organizations protect data is quickly evolving,” said Trusteer CEO Mickey Boodaei at the time. “As attacks become more sophisticated, traditional approaches to securing enterprise and mobile data …

Mobile Security Industry to Grow Fast, Soon Mobile Security Industry to Grow Fast, Soon
· 1

As more of society’s computing tasks move to mobile platforms, businesses now face new security challenges. As the security industry steps up to meet these challenges, the market for mobile security will be a growth segment for years to come. …

Twitter’s Two-Step Authentication Feature: Success or Failure? Twitter’s Two-Step Authentication Feature: Success or Failure?

With over 500 million registered users, Twitter is flying high among the giants of social media. The fact that the service is in high demand has made it a target for identity thieves looking to use social media networks to …

Facebook Assuages Photo-Posting Privacy Concerns, Talks EXIF Data Facebook Assuages Photo-Posting Privacy Concerns, Talks EXIF Data
· 2

You may have seen a viral message sweeping around Facebook lately – one that claims that simply posting a photo on the network could open you up to info-snooping. Basically, the warning suggests that stored EXIF metadata in photos are …

Google Just Eased Some Security Concerns About Cloud Storage Google Just Eased Some Security Concerns About Cloud Storage
· 3

Google announced that Google Cloud Storage now encrypts all data before it’s written to disk. Better yet, this will cost you nothing extra. In fact, you don’t even have to do anything extra or change any settings. Data is simply …

IBM To Launch Super Security Lab With Big Trusteer Acquisition IBM To Launch Super Security Lab With Big Trusteer Acquisition

IBM announced on Thursday that it has entered into a definitive agreement to acquire security company Trusteer. With the news, IBM is launching a cybersecurity software lab in Israel, which it says will bring together over 200 Trusteer and IBM …

IT Security Market to Hit $30 billion by 2017 IT Security Market to Hit $30 billion by 2017

As the internet has grown, so have the dangers of its interconnectedness. Business of all sizes are at risk for multiple types of intrusions into their networks, including the relatively new phenomenon of hacktivism. It’s no surprise, then, that the …

Google’s Android Device Manager Will Help You Find Your Lost Or Stolen Phone Google’s Android Device Manager Will Help You Find Your Lost Or Stolen Phone
· 2

It sucks when your phone is stolen. It’s even worse when you have no way to find said phone. iPhone users have been able to use Apple’s iCloud service to find stolen phones for a while, but there’s been no …

Wikimedia Plans To Beef Up Security Across Projects With HTTPS Wikimedia Plans To Beef Up Security Across Projects With HTTPS
· 1

The Wikimedia Foundation is working on making its projects more secure to protect users’ privacy. As one can imagine, there are plenty of technological obstacles that the foundation must overcome, so it’s going through the process a little at a …

Facebook Releases Guide to Help Prevent Abuse in Partnership with Domestic Violence Group Facebook Releases Guide to Help Prevent Abuse in Partnership with Domestic Violence Group

Facebook is looking to make a push to help prevent domestic abuse in the social media realm by teaming up with its safety advisory board to launch a new guide for survivors of such abuse. The main partnership here is …

Mozilla Introduces New Developments Focusing On Web Security Mozilla Introduces New Developments Focusing On Web Security

Make no mistake about it, Mozilla is committed to making the web a safer place for its users. Although browser security remains somewhat dubious–all of the main browsers perform well in various security tests tests, although, questions about NSA backdoors …

Google Integrates Its App Verification Tool Directly Into Google Play Google Integrates Its App Verification Tool Directly Into Google Play

Malware is a serious concern for mobile devices. Android devices are especially vulnerable thanks to the platform’s open nature. Now Google is making sure almost every Android device owner is adequately protected from malicious apps. Computer World reports that Google …

Tumblr Tells iOS Users to Change Passwords, Download Security Fix Tumblr Tells iOS Users to Change Passwords, Download Security Fix

Tumblr has just released a “very important” security update for their iOS app that they say will address a significant flaw that allowed for passwords to be compromised in “certain circumstances.” In order to make sure your account is secure, …

NSA Is Writing Security Code For Android NSA Is Writing Security Code For Android
· 2

The openness of Android has always been a blessing and a curse. It’s a blessing because anybody can do what they want with it, but that openness means far more instances of malware and hacking. Now the NSA is reportedly …

Oracle Will Make Java Security A Priority Going Forward Oracle Will Make Java Security A Priority Going Forward

To say Java is vulnerable to exploits would be the understatement of the year. In the first two months of 2013, the software was hit with three zero-day exploits. Oracle eventually fixed all of these exploits, but Oracle should have …

Even After Yahoo Defends Itself, Security Expert Still Calls Email Address Plan ‘Trash’ Even After Yahoo Defends Itself, Security Expert Still Calls Email Address Plan ‘Trash’
· 6

Yahoo has raised a pretty good amount of concern regarding account security with a recently announced move to shut down inactive Yahoo IDs and email addresses and give them to other users that desire them. As previously reported, security experts …

Security Expert Call Yahoo’s Email Plan ‘Moronic’ Security Expert Call Yahoo’s Email Plan ‘Moronic’
· 31

A week ago, we reported that Yahoo was about to give away inactive email addresses. The company said it would be freeing up Yahoo IDs (and email addresses) that have been inactive for at least a year, and resetting them. …

CBS Reporter Hacked, Involved ‘Search and Exfiltration of Data’ CBS Reporter Hacked, Involved ‘Search and Exfiltration of Data’
· 1

An internal investigation by a cyber security firm, hired by CBS News, has confirmed that investigative reporter Sharyl Attkisson’s computer was “accessed by an unauthorized, external, unknown party on multiple occasions late in 2012.” Here’s CBS News’ statement on the …

Chinese Hackers Targeted Obama, McCain in 2008, Say Officials Chinese Hackers Targeted Obama, McCain in 2008, Say Officials
· 1

In 2009, President Obama admitted that his campaign’s infrastructure had fallen victim to a hacking attack. He said that hackers had gained access to some emails, various campaign files, and policy position papers. But he didn’t attach any foreign entity …

LinkedIn Unveils Two-Step Verification on the Heels of Twitter LinkedIn Unveils Two-Step Verification on the Heels of Twitter
· 1

Following Twitter’s recent announcement, LinkedIn has just launched their own two-step verification feature. “At LinkedIn, we are constantly looking for ways to improve the security of our members’ accounts. All LinkedIn accounts are already protected by a series of automatic …