Cyber Security: Authentication, Identity and Privacy

By IAmI Authentications | IAmI Authentications created a magazine on Flipboard. “Cyber Security: Authentication, Identity and Privacy on Flipboard” is available with thousands of other magazines and all the news you care about. Download Flipboard for free and search for “IAmI Authentications”.

Not all fingerprint sensors are created equal — here's what to look for

Fingerprint sensors are increasingly being used to secure laptops, five years after the iPhone 5S made them common on smartphones.<p>But in a rush to equip even inexpensive laptops with fingerprint sensors — often using the same parts that are used on phones — laptop makers may be overlooking one key …

Internet of Things

Massive database containing over 560 million passwords discovered

Looks like it’s time to change passwords again. Security researchers have discovered a massive database of login credentials — over 560 million emails and passwords — put together by an unknown person. All of the information is insecure.<p>The database was discovered by the Kromtech Security Research …

Security

Is My Password Secure? NIST Advises Against Periodically Changing Passwords

The National Institute of Standards and Technology (NIST) is no longer recommending people periodically change their passwords as part of the …

Security

Beware! Hackers Can Steal Your Windows Credentials Remotely Using Chrome

A security researcher has discovered a serious vulnerability in the default configuration of the latest version of Google's Chrome running on any …

Second massive WannaCry-like cyber attack identified

Cyber security experts reveal they have found a second massive computer virus which, like the WannaCry cyber attack last week, has affected hundreds of thousands of computers world-wide and may have North Korean origins.<p>This second global hack exploits the same Microsoft vulnerabilities as the …

Cybersecurity

Study: Seriously, Nobody Cares About Cybersecurity Despite the Risks

With hackers holding Netflix series hostage, ransoming off personal information, and generally mucking up the digital world with DDoS attacks, …

Cybersecurity

Chelsea Manning Instagrammed her 'first steps of freedom'

Chelsea Manning is free.<p>She walked out of a military prison in Fort Leavenworth, Kansas on Wednesday, after seven years behind bars.<p>Manning — a former Army intelligence analyst — was sentenced to prison after distributing troves of military documents to Wikileaks. She got a hold of the classified …

Chelsea Manning

Silicon Valley has idolized Steve Jobs for decades—and it’s finally paying the price

Steve Jobs has been called the greatest businessman the world has ever seen and the best CEO of this generation.<p>But he’s also the same man who would allegedly yell at people for 30 minutes straight, cut in front of his employees at lunchtime, berate hospitality and restaurant staff, park in …

Silicon Valley

Researchers Use Digitally Created Fingerprints to Unlock Smartphones

A team of researchers from the Tandon School of Engineering at the New York University has created a method of generating fake digital fingerprints …

As long as humans have access to email, phishing will work

An email has arrived, and it’s just for you. What a moment. Someone has something to share. It’s an old friend, or a current colleague, or maybe your former dentist.<p>Dr. Scott has shared a document on Google Docs with you.<p>That’s unusual, but Dr. Scott is all about business, not one to share …

Google Docs

Week in review: Hacking industrial robots, criminals exploit SS7 flaws to empty bank accounts

Here’s an overview of some of last week’s most interesting news and articles:<p><b>Three cybersecurity threat trends that organizations should address …

Security

Hackers Can Now Sneak Past Two-Step Authentication, Thanks To A Glaring Security Flaw

Phones are vital to every day existence. We stay in touch with loved ones, answer work emails, play silly games, and use them to follow our favorite thirst traps on Insta. They’re also a centerpiece of two-factor authentication — used to make changes, or log into certain secure accounts. In an …

Security

We Were Warned About Flaws in the Mobile Data Backbone for Years. Now 2FA Is Screwed. - Motherboard

It has finally happened.<p>For years, researchers, hackers, and even some politicians have warned about stark vulnerabilities in a mobile data network called SS7. These flaws allow attackers to listen to calls, intercept text messages, and pinpoint a device's location armed with just the target's …

Security

World Password Day: Make the Internet a more secure place

Identity theft is one of the world’s fastest growing crimes, but adding strong authentication to your password can prevent it. Today is World …

Security

Thieves drain 2fa-protected bank accounts by abusing SS7 routing protocol

The same weakness could be used to eavesdrop on calls and track users’ locations.<p>A known security hole in the networking protocol used by cellphone …

Security

Bank data breaches are up, and it's an insider job

<i>This story was delivered to BI Intelligence "Fintech Briefing" subscribers. To learn more and subscribe, please click here.</i><p>There have been many high-profile bank breaches in the news of late, and much of the blame has been laid on these institutions' legacy operating systems, and their inability to …

FinTech

Massive Tinder Photo Grab Is Latest Scary Warning To Be Careful What You Post

Stealth sweeper says he'll use 40,000 photos for female and male facial recognition training for artificial intelligence.<p>Images of Tinder users posting their sexiest selfies were swept up in a massive grab of some 40,000 photos from the dating app.<p>The photos were sucked up days ago by a dataset …

Machine Learning

Microsoft Word flaw took so long to fix that hackers used it to send fraud software to millions of computers

A flaw in Microsoft Word took the tech giant so long to fix that hackers were able to use it to send fraud software to millions of computers, it has been revealed.<p>The security flaw, officially known as CVE-2017-0199, could allow a hacker to seize control of a personal computer with little trace, …

Security

A mysterious botnet has hijacked 300,000 devices, but nobody knows why

Researchers know what the botnet is capable of — but they don't seem to know what it'll actually do.<p>A botnet discovered late last year has ballooned …

Infosec

A Week Later, Hacked Spyware Vendors Haven't Warned Their 130,000 Customers - Motherboard

Tens of thousands of people are in the dark.<p>Motherboard recently reported hackers had targeted two companies that sell spyware to the everyday consumer—Retina-X and FlexiSpy. Hackers made off with a mix of over 130,000 customer records, as well as company documents and even text messages and photos …

Security

People are scared of artificial intelligence for all the wrong reasons

People in Britain are more scared of the artificial intelligence embedded in household devices and self-driving cars than in systems used for predictive policing or diagnosing diseases. That’s according to a survey commissioned by the Royal Society, which is billed as the first in-depth look at how …

Machine Learning

Mass Scan Revealed More Than 30000 Windows Computers Infected by NSA backdoor DoublePulsar

A Recent Mass Scan Revealed That More than 30000 Windows Machine Infected by National Security Agency Backdoor <b>DOUBLEPULSAR</b> .<b>DOUBLEPULSAR</b> one of the …

Malware

Cardiff cyber security research centre 'first in Europe'

<b>A new research centre to tackle cyber attacks has been set up in Cardiff.</b><p>Launching the Centre of Excellence in Cyber Security Analytics, Cardiff University and Airbus said it was the first of its kind in Europe.<p>Their research will aim to protect corporate IT networks, intellectual property and …

Cybersecurity

Over 36,000 Computers Infected with NSA's DoublePulsar Malware

DOUBLEPULSAR, one of the NSA hacking tools leaked last Friday by the Shadow Brokers, has been used in the wild by ordinary hackers, who infected over …

Information Security

Don't Give LinkedIn Access to Your Phone's Bluetooth

<i>UPDATED 4:45 p.m. ET Thursday with comment from LinkedIn.</i><p>The LinkedIn mobile app for iOS wants access to your Bluetooth connection so that it can …

LinkedIn

New password guidelines say everything we thought about passwords is wrong

When I recently discovered a draft of new guidelines for password management from NIST (the National Institute of Standards and Technology), I was amazed about the number of very progressive changes they proposed.<p>Although NIST’s rules are not mandatory for nongovernmental organizations, they …

Security

This Phishing Attack is Almost Impossible to Detect On Chrome, Firefox and Opera

A Chinese infosec researcher has discovered a new "almost impossible to detect" phishing attack that can be used to trick even the most careful users …

Health data breaches in March surpassed January and February combined, study finds

Security incidents spiked upward during March, according to the Protenus Breach Barometer, a monthly snapshot of reported or disclosed breaches …

Cybersecurity

Your Electronic Medical Records Could Be Worth $1000 To Hackers

, Women@Forbes<p>ClinicAll EMR<p>How much is your life worth to hackers? On the black market, the going rate for your social security number is 10 cents. Your credit card number is worth 25 cents. But your electronic medical health record (EHR) could be worth hundreds or even thousands of dollars.<p>EHRs …

Electronic Medical Records