Monday, June 3rd, 2013
When it comes to threats to mobile devices, most people don't think of chargers as a likely point of attack. But plugging in an iPhone — or any smartphone or tablet — could come at a price.
At next month's Black Hat security conference in Las Vegas, three Georgia Institute of ...
Posted in Hardware, Privacy, Security | No Comments
Wednesday, May 29th, 2013
As individuals and organizations digitize more data, they become more susceptible to major data breaches. Though convenient, inexpensive USB flash memory sticks and other portable storage devices certainly don't help the cause, because workers use them transport databases and other confidential information. On top of the real danger of misused ...
Posted in Hardware, Privacy, Security | No Comments
Saturday, May 25th, 2013
As more hardware vendors seek to implement the new NIST 800-155 specification that was designed to make the start-up BIOS firmware on our PCs and laptops more secure, they may need to rethink the security assumptions upon which the standard depends. A trio of researchers from The MITRE Corp. say ...
Posted in Hardware, Security | No Comments
Wednesday, May 22nd, 2013
Today we’re introducing a new security feature to better protect your Twitter account: login verification.
This is a form of two-factor authentication. When you sign in to twitter.com, there’s a second check to make sure it’s really you. You’ll be asked to register a verified phone number and a confirmed email address. To get started, ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, May 21st, 2013
Having control over an email account can be a lot of power, even though most people would probably say they do not care if someone else is reading their private emails. But it’s not always about reading those private emails. Of course there have been quite a few attacks where ...
Posted in Internet, Privacy, Security | No Comments