Category: Identity

December 20, 2016
Mobile Wallets Present New Opportunities for Fraud
One of the great things about the advanced mobile devices everyone carries now is that they serve so many different purposes. They’re encyclopedias, world maps, communications devices, and now they’ve evolved to become wallets, too. But as convenient as mobile wallet technology is, it carries with it some unique threats and risks for both consumers…
Read More →
December 15, 2016
Yahoo Data Breach Highlights Defender’s Disadvantage
For the second time in less than three months, Yahoo has disclosed a massive data breach, and this is one for the record books. The company said more than one billion accounts are affected by the breach, and Yahoo officials still aren’t exactly sure how the attackers got in. On Wednesday evening, Yahoo CISO Bob…
Read More →
December 5, 2016
Google Trusted Contacts Allows Users to Share Location in Real Time
Google has spent a lot of time and money on security over the last few years, developing new technologies and systems to protect users’ devices. One of the newer technologies the company has come up with is designed to provide security for users themselves rather than their laptops or phones. On Monday Google launched a new…
Read More →
October 31, 2016
Silently Tracking Users With Ultrasonic Beacons
As consumers have begun using ad blockers in greater numbers, skipping TV ads with DVRs, and generally looking for any possible way to avoid advertising, technology providers and marketers have been trying to find new methods to get their messages in front of potential buyers. One of the newer methods uses ultrasonic signals in ads…
Read More →
October 31, 2016
Dozens Arrested in Huge European Online Fraud Raid
Law enforcement officials in 10 countries conducted sweeping raids Monday on what they is a distributed, organized cybercrime ring that has been conducting online fraud operations across Europe and have stolen more than €3.5 million. The raids were coordinated by Europol and involved authorities in the U.K., Spain, Portugal, France, Ireland, and several countries, and resulted…
Read More →
October 25, 2016
Visa and Intel Collaborate on IoT Payment Security
As the security of IoT devices has become more and more of a problem, Visa and Intel are forming an alliance to make payments from those devices more secure and trustworthy. The partnership has two separate components: adding Visa’s encryption technology to devices that use Intel’s chipsets, and hardware-level device authentication to ensure that payments are…
Read More →
September 30, 2016
On the Wire Podcast: Jessy Irwin
Jessy Irwin makes her triumphant return to the podcast to help us work through our feelings about the Yahoo data breach, the NIST guidance on SMS two-factor authentication, and why we’re still giving terrible security advice to users. Dennis Fisher and Jessy also talk about what kind of breaches could be lurking on the horizon…
Read More →
September 28, 2016
Senators Demand Answers of Mayer on Yahoo Data Breach
Six Democratic senators are demanding answers from Yahoo CEO Marissa Mayer about the massive data breach that the company disclosed last week. The legislators want to know when Yahoo discovered the breach, which occurred in 2014, and why it took so long to disclose it to the public. The Yahoo data breach involves information from…
Read More →
September 20, 2016
Fighting Account Takeover Attacks With AuthTables
The goal of many attackers is taking over a target account. That can be the account of an admin at a large enterprise, the bank account of a high net-worth victim, or the email account of a human rights activist. While banks and financial services companies are aware of the problem, many other organizations aren’t,…
Read More →
August 31, 2016
68 Million Hashed Dropbox Passwords Dumped Online
The scope of a compromise of Dropbox four years ago that the company initially said only involved customer email addresses being stolen has now expanded, with more than 68 million user passwords dumped online. The cache comprises passwords that are hashed with either SHA-1 or bcrypt and none of them are in plaintext. When Dropbox…
Read More →
In a race of information vs. misinformation, what will deep fakes and data breaches look like? Register for our webinar to learn how to defend against these types of threats