Data Security

Samsung, Blackberry double-team enterprise data security

Samsung, Blackberry double-team enterprise data security

Is the most secure of both worlds? It sure sounds that way. Samsung and Blackberry have come together, but it won’t be for a weird new phone. This time, both companies are taking their respective security platforms, and combining them into a single effort. Blackberry’s BES12 and Samsung’s KNOX will partner for an end-to-end security solution, which will be made available on all Galaxy phones that currently have KNOX. Their target market? You guessed it — the coveted enterprise space.

Continue Reading

US Postal Service employee, customer details hacked

US Postal Service employee, customer details hacked

If you thought only retail chains like Home Depot and Target or commercial services like Apple's iCloud are the only victims of data breaches, better thinking again and rethink your outlook on personal information security. The US Postal Service has just disclosed that it was the target of a cybercrime that compromised personal information stored in its databases. But unlike other data breaches, this one actually didn't affect customers as much as it did the USPS' own employees, with attackers able to run off with critical pieces of information.

Continue Reading

Everkey Kickstarter aims to replace passwords with wearable

Everkey Kickstarter aims to replace passwords with wearable

It's no doubt by now that we are living in the age of wearables. While most offer a combination of features such as telling time, ways to interact with messages, and number of health tracking options, Everkey hopes to use the wrist space to replace traditional passwords with a digital authenticator. They're Kickstarting their device with a hope of changing the task of logging in to simply being in physical proximity.

Continue Reading

Phishing scams 45% successful according to Google study

Phishing scams 45% successful according to Google study

You would think that we've been taught and warned enough to recognize the signs of phishing attempts, those emails and websites designed to trick us into entering usernames and passwords for things like email, Facebook, and online banking, often designed to look authentic, but still not appearing quite right. Well, it turns out a number of internet users are still falling victim to such scams. A very large number of users, according to a study from Google and the University of California, San Diego.

Continue Reading

Judge rules fingerprint-locked phones are fair game during investigations

Judge rules fingerprint-locked phones are fair game during investigations

There are many ways to protect your smartphone: password, pin, pattern, and more recently, a fingerprint. While legally you can't be compelled as part of an investigation to reveal any of the first three, a judge has ruled that you can be forced to relinquish your fingerprint to investigators seeking access to your device. The reason, says the judge, is that the fingerprint isn't knowledge like a password, but is instead a physical object of sorts, like a key or a DNA sample.

Continue Reading

Whisper staff suspended amid investigations into Guardian report

Whisper staff suspended amid investigations into Guardian report

Whisper, the social network/app built on the premise of allowing users to post brief statements and images in complete anonymity, has put its editorial staff on suspension, a decision made by CEO Michael Heyward. The decision comes as Whisper continues to defend itself in response to a newspaper report from The Guardian that said the company did in fact track its users even if they opted out of location-based features.

Continue Reading

Xiaomi global expansion: moving data centers out of China

Xiaomi global expansion: moving data centers out of China

Xiaomi is growing out of its shell. It has already started making some of its devices, unfortunately not always the latest ones, available in other countries, hoping to replicate the same wild success it enjoys in China. But in order to scale better to an international audience, especially as far as its services are concerned, the company is now also relocating some of its data away from Beijing and into other territories, some of them in the US. But is that really the only reason for this move?

Continue Reading

iCloud attacks were real: Apple comments

iCloud attacks were real: Apple comments

This week it was reported that Apple’s iCloud servers were under attack by China - as it turns out that’s not entirely true. Apple has made clear in a statement that there were indeed "intermittent organized network attacks" this week, but that they were done on people attempting to access the iCloud webpage. There weren’t any attacks on the iCloud servers themselves, nor were there any drops of user information. Apple does, however, suggest that you pay attention to "certificate warnings."

Continue Reading

Google teams with FIDO’s U2F USB Security Key

Google teams with FIDO’s U2F USB Security Key

The Security Key is not something you probably have in your pocket right this minute. It’s a newer sort of verification system made in partnership with the FIDO Alliance, now working with Google and Google Chrome for an added layer of security for Google websites. With this system you’ll never need worry about being scammed by a website pretending to be Google - not even once. You will need an official U2F Security Key to make it all work to Google's satisfaction.

Continue Reading

Prev 1 2 3 4 5 6 7 8 Next