Hardware vendors often skimp on providing basic security for products even when it is no real skin off their noses.
Hackers David Byrne and Charles Henderson cited the case of the world’s largest Point of Sale (PoS) systems vendor which has been slapping the same default password (66816) on its gear since 1990. more»
Telephone outfit BlackBerry is launching a new certificate service that will help bring the security level it offers on smartphones to the Internet of Things
Certicom, a subsidiary of BlackBerry, announced a new offering that it contends will secure millions of devices, expected to be part of the Internet of Stuff (IoT). more»
The CEO of a security company has accused his fellow competitors of peddling snake oil to clients and lifted the lid on how they are doing it.
Paul Vixie, CEO, Farsight Security said that as security breaches increasingly make headlines, thousands of Internet security companies are chasing tens of billions of dollars in potential revenue and are doing by telling porkies to clients.. more»
Security outfit Symantec has been saying “oh look a badger” to reporters asking about its sale of its storage storage unit Veritas, for as much as $8 billion.
The dark satanic rumour mill claims that the floundering security vendor has approached NetApp, EMC and several private equity firms to gauge interest in the business. more»
Hacking attacks which are designed to destroy a company, rather than just steal information, are on the rise.
A poll by the Organisation of American States found that 40 percent of respondents had battled attempts to shut down their computer networks, 44 percent had dealt with bids to delete files and 54 percent had encountered “attempts to manipulate” their equipment through a control system. more»
The RSA Conference next month will be missing “booth babes”.
According to a post by security expert Bill Brenner on the LiquidMatrix blog:
“All Expo staff are expected to dress in business and/or business casual attire. Exhibitors should ensure that the attire of all staff they use at their booth (whether the exhibitor’s direct employees or their contractors) be considered appropriate in a professional environment. more»
Biometric systems, particularly in relation to smartphones, look like they’re going to boom during this year.
ABI Research, a market analysis company, said that worldwide revenues for such systems will deliver $3.1 billion this year.
The systems will be targeted not only at home users but at authentication systems for the enterprise market, according to ABI. more»
For years the most basic method of super security for a computer was to unplug it from the network or internet.
However a team of security experts from Ben-Gurion University of the Negev (BGU) have discovered a new method to breach air-gapped computer systems. more»
Search engine Google is furious that an Egyptian networking company managed to clone its security certificate.
According to Google’s bog, the search engine became aware of unauthorised digital certificates for several Google domains. The certificates were issued by an intermediate certificate authority apparently held by a company called MCS Holdings. more»
Francis Maude, minister for the Cabinet Office in matters of cyber security, said that the UK and Israel have established three collaboration ventures to get government funding for cyber security.
The governments will contribute £1.2 million of funding to create a bilateral cyber research programme, he said. more»
The Ponemon Institute and IBM have jointly released a report which they said displays “the alarming state” of mobile insecurity.
According to the research, 40 percent of large companies – including many in the Fortune 500 – aren’t protecting the mobile apps they build. more»
Opera Software bought a Canadian company called SurfEasy, for an undisclosed amount.
SurfEasy has a VPN (virtual private network) system aimed at securing smartphones, tablets and PCs, Opera said.
A VPN adds an extra level of net security to filter traffic between the web nd devices. more»
FORMER NSA and NASA staffer Patrick Wardle, who heads up research at security start-up Synack, he has found a way to bypass protections in Apple Macs without getting caught.
Download files, known as .dmg files, for products including Kaspersky, Symantec, Avast, Avira, Intego, BitDefender, Trend Micro, ESET and F-Secure are all sent over unencrypted HTTP lines, rather than the more secure HTTPS. more»
A report from IBM’s security division estimates that in 2014 “at lease” a billion records of people across the world were leaked.
That’s about one in seven of this planet’s humanoid population.
IBM released its X-Force quarterly report and relays information about over 9,000 security “vulnerabilities” affecting over 2,600 vendors in 2014. more»
Qualcomm has announced details of its Ultrasonic Finger Print Reader which is part of its new Snapdragon processor.
The idea is that the tech can be used by smartphone ODMs and OEMs to provide ultrasecurity for their phones.
Qualcomm’s tech uses ultrasonic waves to scan all of the ridges and wrinkles of your fingers. more»