The Latest in IT Security

Posts Tagged ‘authentication tokens’

Custom crawler PlayDrone was used by researchers to download and decompile over 880,000 free programs to find thousands of secret tokens that authenticate service to service communication embedded in the source code. Authentication tokens are secret keys used instead of log in credentials by apps that facilitate communication with a third party service, such as […]

Read more ...

by Dave Michmerhuizen & Luis Chapetti – Security Researchers Bank phishing is a world-wide problem, but nowhere is it more widespread or sophisticated than in Latin America. Consumers throughout the Southern Hemisphere are constantly bombarded by web links and spam attachments which present convincing displays that aim to steal usernames, passwords and other authentication tokens. […]

Read more ...

Google is working on fixing a hole in Android that can allow someone to snoop around on an unencrypted WiFi network and access the user’s calendar and contact data on Android powered smartphones.Google announced on 18,April-2011 that the flaw, which was first detected by researchers from the University of Ulm in Germany, occurs in the […]

Read more ...


Categories

THURSDAY, APRIL 18, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments