The Latest in IT Security

1

Shoddy security and possible privacy invasions – those are two risks that come along with owning a smart device. Even if you’ve taken additional steps to protect your privacy – such as putting your IoT devices behind a VPN – an ISP, or an adversary with capabilities similar to an ISP, can still use your […]

Read more ...

1

More online services than ever now offer two-step authentication — requiring customers to complete a login using their phone or another mobile device after supplying a username and password. But with so many services relying on your mobile for that second factor, there has never been more riding on the security of your mobile account. […]

Read more ...

1

Every ATM or smartphone user can attest to the discomfort of having a stranger standing close enough to observe a financial transaction — and potentially note a PIN or account number. Now researchers at the NYU Tandon School of Engineering have announced an application to combat such “shoulder-surfing,” whether in person or via a building’s […]

Read more ...

1

At the start of Q2 2017, we registered a wave of malicious mailings imitating notifications from well-known delivery services. Trojan downloaders were sent out in ZIP archives, and after being launched they downloaded other malware – Backdoor.Win32.Androm and Trojan.Win32.Kovter. The usual trick of presenting dangerous content as important delivery information was employed by the…

Read more ...

Categories

FRIDAY, OCTOBER 20, 2017

Featured

Archives

Latest Comments

Social Networks