Playing in the Digital Sandbox: Mobile versus Desktop Security
Mobile operating systems consume resources from unknown sources on the Internet all the time, and yet they are not infected in the same manner as desktop operating systems. Certainly, sideloaded malicious Android apps are able to access parts of a mobile device that the user has authorized (e.g., pictures, contacts, SMS). We have also seen [Read More...]
Mobile Malware — Will it Expand in 2014?
This comes as no surprise, but the bring-your-own-device (BYOD) movement has reached critical mass. More and more enterprises are leveraging mobile to share information, complete transaction or increase business efficiency. In fact, 67 percent of organizations use personal devices at work, and 42 percent of companies surveyed now allow BYOD at the enterprise level. Unfortunately, [Read More...]
Can You Spot a Phishing Email?
This holiday season, buyers everywhere will flock to the Internet to rack up savings on deals and avoid the hassles of shopping in malls and department stores. Unfortunately, shopping online without using caution can lead to great headaches due to the prevalence of criminal activity. One of the most devastating identity theft techniques comes in [Read More...]
Top 10 Holiday Scams to Steer Clear of this Season – Part 2
This is Part 2 of a two-part series. To read the first post, click here. Top 10 Holiday Scams to Steer Clear of this Season 6. Order shipment notification When doing your holiday shopping, always make sure that the email notification confirming your order shipment is directly tied to the official company of which you [Read More...]
Top 10 Holiday Scams to Steer Clear of this Season – Part 1
Top 10 Holiday Scams to Steer Clear of this Season You have spent all night looking for the perfect gift online for your spouse, children or significant other. After hours of searching, you finally come across the ultimate package certain to grant you a lifetime pass to the Nice List — two tickets to the [Read More...]
Bypassing Fingerprint Biometrics Nothing New
So, Germany’s Chaos Computer Club — which weirdly sounds like an outcast AV group at someone’s high school — claims to have circumvented Apple’s new Touch ID fingerprint biometric sensor featured on the just-released iPhone 5s. This isn’t news. Sure, it’s new in relation to attacking the consumer-loved iPhone image. But the “hack” shown is [Read More...]
iPhone 5s Gains Biometric Authentication via ‘Touch ID’ Home Button
Biometric security is once again moving to the forefront of mobile technology. During Apple’s unveiling of the new iPhone 5s today, one of the newest features is the introduction of a fingerprint reader to add consumer-level biometric authentication. It is the first major U.S.-based mobile manufacturer to incorporate a fingerprint scanner since Motorola released the [Read More...]
Digital Certificates on Your Phone?
It’s not a Peyton Manning TV spot, but it’s certainly more important to the security of your identities. In Entrust’s recent infographic, “Mobile Security: Perception vs. Reality,” a third-party study found that 38 percent of enterprises have or plan to implement mobile device certificates in 2013. But there is also the myth that certificate-based identities [Read More...]
Software Tokens: Simplifying Digital Security
Picture this scenario: you left your apartment for a business trip, and are sitting on the plane ready to take off when you realize you are missing something. You rummage through your carryon bag, when it hits you: you have left your hardware security token sitting on top of your bureau. How are you going [Read More...]
Not All Multifactor Authentication Techniques are Equal
This fact seems to be lost on some who are responsible for security architecture. One of my reflections on this past summer is that not everyone is aware of the difference between weaker and stronger forms of multifactor authentication. You have likely read about multifactor authentication, have used it with your social networking websites, or [Read More...]