The Latest in IT Security

1

In recent years the global payment landscape has undergone a seachange. Gone are the days where financial transactions impacted only core and branch banking. In the last few years, fintechs have opened previously unimaginable avenues for individuals and businesses alike. Fueled by the mobile revolution, the financial vocabulary has grown to include tablet banking, mobile […]

Read more ...

1

When it comes to mobile services, it’s been well-established that users value speed and convenience. But organizations that give it to the whims of consumers may face a mountain of security risk.

Read more ...

1

Facebook is being accused of spamming people via the phone numbers they used to turn on two-factor authentication (2FA) and posting their “PLEASE STOP!!” replies to their walls.

Read more ...

1

Andrew “bunnie” Huang and Edward Snowden have designed a hardware device that attaches to an iPhone and monitors it for malicious surveillance activities, even in instances where the phone’s operating system has been compromised. They call it an Introspection Engine, and their use model is a journalist who is concerned about government surveillance. Read More

Read more ...

Categories

MONDAY, MAY 21, 2018

Featured

Archives

Latest Comments

Social Networks