Cyber Security: Authentication, Identity and Privacy

By IAmI Authentications | IAmI Authentications created a magazine on Flipboard. “Cyber Security: Authentication, Identity and Privacy on Flipboard” is available with thousands of other magazines and all the news you care about. Download Flipboard for free and search for “IAmI Authentications”.

91% of cybersecurity pros fear hackers will use AI to attack their company

Some 87% of companies use artificial intelligence in their cybersecurity strategy, according to Webroot.<p>Building a slide deck, pitch, or …

Artificial Intelligence

Chrome to Support Fingerprint Scans on Android, Mac

Google's beta release for Chrome 70 adds support for the fingerprint sensors on Android devices and Touch ID on macOS, which will let website …

Cybersecurity

Staying secure: the small business cybersecurity checklist

Cyberhacks and security breaches at big corporations are well documented but a business of any size can be vulnerable to attack<p>The Institute of Directors (IoD) found 44pc of SMEs had been hit by a cyberattack at least once in the past year, with the average cost to each business about £25,000.<p>The …

Social Issues

AT&T, Sprint, T-Mobile & Verizon’s ‘Project Verify’ Offers New Mobile Authentication Platform

- Sep 13, 2018<p>AT&T, Sprint, T-Mobile and Verizon announced in March their plans for a new authentication platform for the iPhone and other mobile …

T-Mobile

Security flaw in ‘nearly all’ modern PCs and Macs exposes encrypted data

Most modern computers, even devices with disk encryption, are vulnerable to a new attack that can steal sensitive data in a matter of minutes, new research says.<p>In new findings published Wednesday, F-Secure said that none of the existing firmware security measures in every laptop it tested “does a …

Encryption

Almost all UK businesses have suffered some kind of security breach

Nearly every business in the UK has been affected by a form of data breach over the last year, new figures have claimed.<p>According to a new report by …

Cybersecurity

Why higher education is one of the worst industries at handling cyberattacks

Some 73% of institutions took three or more days to apply patches for cyberthreats, according to a recent EfficientIP report.<p>Higher education ranks …

Cybersecurity

Simple Hack Turns India's Massive Biometric Database Into a Profitable Counterfeit System

India’s controversial biometric database, Aadhaar, has been once again compromised, according to a three-month investigation launched by HuffPost …

Profit

Most Common Types of Cyberattacks as Seen Today

As cyber-attacks are on a continuous rise they have resulted in being one of the major threats to the world. Since 2008 there has never been much …

Cyber-attacks

Researchers Show Off Method for Hacking Tesla’s Keyless Entry, So Turn on Two-Factor Authentication

Elon Musk started the day with some much-needed good news after Space X pulled off an early morning satellite launch without any troubles. The good …

Tesla

Here’s how hackers can install malware on your Mac through Safari

You might consider Safari to be the safest web browser for macOS, but one security researcher has proven it’s not completely bulletproof.<p>Patrick Wardle has demonstrated how hackers can remotely infect a Mac with malicious software using a Safari vulnerability. Apple’s built-in protections can do …

Apple

Report: Hard-to-detect form of cyberattack soars

Fileless cyberattacks, which are hard to detect because they don't add or alter files on target systems, have nearly doubled in the first half of …

Cybersecurity

Why 60% of Cybersecurity Attacks Happen to Small Businesses

Many small businesses are attacked by cybercriminals because they don't have the funds to put behind a good security system. Paul Szyarto, founder of …

Cybersecurity

Terrifying reality of what actually happens when you give an app access to your camera and microphone

A tech expert has revealed the shocking truth behind what an application can do once mobile phone users gives it access to their devices.<p>Most …

Apps

How To: Manipulate User Credentials with a CSRF Attack

Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of …

Information Security

Phone Numbers Were Never Meant as ID. Now We’re All At Risk

On Thursday, T-Mobile confirmed that some of its customer data was breached in an attack the company discovered on Monday. It's a snappy disclosure …

Identity Theft

USBHarpoon Is a BadUSB Attack with A Twist

Several security experts have built a malicious version of a USB charging cable, one that can compromise a computer in just a few seconds. Once …

Malware

Black Hat and Defcon cybersecurity experts share tips on how to protect yourself

Have a daily discipline of thinking, "What could go wrong?"<p>Mårten Mickos, CEO, HackerOne

Cybersecurity

Why phishing remains a critical cyber-attack vector

Spear phishing emails targeting business users are so well-crafted they should be called "laser" phishing attacks, says Microsoft's Cybersecurity …

The Latest Thing You Need to Worry About Cybercriminals Hacking? Your Voice.

The shift to voice biometrics and speech-controlled systems is raising the risk of voice cloning and subliminal attacks.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>It may sound like science fiction, but a new threat is emerging in the world of hackers that is taking aim at the …

Mobile payment apps get mediocre privacy scores from Consumer Reports

(Credit: Scyther5/iStockphoto)<p>Keeping your credit card information protected is no joke, and the latest identity theft numbers prove it. A Javelin Strategy & Research study showed identity fraud at an all time high for 2017. More than 16 million people were victims of identity theft, racking up …

Apps

Password managers vulnerable to insider hacking

A new study shows that communication channels between different parts and pieces of computer software are prone to security breaches. Anyone with …

DHS warns of vulnerabilities in millions of smartphones

<b>Facepalm:</b> According to research funded by the US Department of Homeland Security, millions of smartphone users could be at risk of having hackers …

Black Hat Researcher Shows Why Air Gaps Won't Protect Your Data

Got a secret? Put it behind an air gap by disconnecting your computer from the internet. That works, right? At Black Hat, a researcher showed off …

How to Find Out Who Is Tracking You Through Your Smartphone

Just press *#21# on your mobile phone to find out if your calls, messages and other data are being diverted. The status of different type of …

Phones at all major US carriers filled with vulnerabilities, say researchers

Major US phone carriers may have a major problem.<p>Researchers funded by the Department of Homeland Security discovered security vulnerabilities in mobile devices used by Verizon, AT&T, T-Mobile, Sprint and more, DHS program manager Vincent Sritapan told Fifth Domain at the Black Hat security …

Mobile Devices

New wi-fi crack attack allows outsiders to snag user creds

Depending on length and complexity of password.

GDPR is eroding our privacy, not protecting it

It’s been more than a couple of months since GDPR (the EU General Data Protection Regulation) came into force. The promise of <i>giving the citizens back control of their personal data</i> was brash and resonated with many of us, but apart from emboldening few data protection activists, the GDPR has not …

Password breach teaches Reddit that, yes, phone-based 2FA is that bad

Attackers steal password data, user messages, email addresses, and more.<p>A newly disclosed breach that stole password data and private messages is …