security skull

Malvertising campaign targets Americans through major websites including BBC and New York Times

Top news websites including the BBC, the New York Times and MSN were hit over the weekend by a co-ordinated malware campaign. Delivered through the advertising networks used by the sites, the malvertising attack aimed to install ransomware on victims' computers.

On-site ads are far from loved, hence the prevalence of ad-blocking tools. But as well as being an annoyance, online ads can also pose a serious security risk -- something highlighted by this attack. The infected ads redirected people to servers hosting the Angler exploit kit and was engineered to target US-based web users.

By Sofia Elizabella Wyciślik-Wilson -
sans_serif_google_logo_2015

Google's Single Sign On adds support for Microsoft Office 365, Facebook at Work, Slack and more

Besides being the super poplar search engine, email provider, work and collaboration services provider, Google is also used, by a number of different services, as an identity provider.

It allows people to register and log into different online services using their Google account. Now, the company announced it’s expanding the feature to add a number of new services, some of which are direct competitors.

By Sead Fadilpašić -
pixel padlock

It is time to prioritize security for Internet of Things and wearables

We are on the cusp of a totally connected world. The Internet of Things is no longer an emerging trend, it has arrived. If you want evidence -- real evidence rather than the speculation of industry analysts -- then take a look at the $1.4 billion Cisco reputedly put on the table at the start of February to acquire IoT platform provider Jasper Technologies.

Jasper, founded in 2004, came about as a result of an epiphany that CEO and founder Jahangir Mohammed had when, after seeing a warning light on his car dashboard, he needed to spend several hours finding a mechanic to diagnose a problem that a connected car could have done in seconds. Just 16 years later, in-car connectivity of some sort is expected as standard in most new cars.

By Nazar Tymoshyk -
broken_encryption

Limiting encryption affects security and competitiveness

The Information Technology and Innovation Foundation (ITIF), a nonpartisan research and educational institute and policy think tank, today became the latest to come out and urge the US government not to limit the commercial use of encryption.

In its new report, entitled Unlocking Encryption: Information Security and the Rule of Law, co-author Alan McQuinn -- an ITIF research assistant -- argued that restricting encryption for use by law abiding citizens and businesses would reduce overall security and be ineffective at keeping encryption out of the hands of terrorists.

By Alasdair Gilchrist -
ID verification

Registration-as-a-service makes for easier customer authentication

With so much choice available online, if a business doesn't deliver on meeting customer expectations then it's likely to lose out. One of the main challenges in keeping customers happy is delivering effective authentication while maintaining security.

Identity management company Gigya is releasing a new registration-as-a-service (RaaS) offering to enable enterprises to more effectively authenticate consumers with consistent cross-device experiences.

By Ian Barker -
internet_of_things_cloud_iot

Qualcomm Snapdragon SoC vulnerability could compromise IoT security

One of the greatest concerns surrounding the growth of the Internet of Things (IoT) is its security, and it seems that some people's worst fears have just been realized. Security experts at Trend Micro have discovered a vulnerability in Qualcomm Snapdragon-produced SoC (system on a chip) devices.

In fact, it is the same vulnerability that cropped up earlier in the month, affecting Nexus 5, Nexus 6, Nexus 6P and Samsung Galaxy Note Edge Android handsets. This in itself is concerning as these are devices that are no longer in line for security updates, but more concerning is the fact that the same chips are used in IoT devices. The vulnerability makes it possible for an attacker to gain root access to the hardware, and this is worrying in a world of inter-connected devices.

By Sofia Elizabella Wyciślik-Wilson -
amazon_trust

Did Amazon have a security breach? Probably not

We've grown accustomed to security breaches, from Target to Home Depot and pretty much everywhere in between. It seems like daily news lately, but sometimes it seems companies are so hush-mouth that we just don't know. It's obviously in their best interest to not let word get out – bad for business, and all.

Today a story surfaced about Amazon sending some customers emails requesting that they reset their passwords. The message itself is a bit cryptic, so it's hard to say what really happened. There is also the (slim) possibility it was a scam. We say slim because there are no links to click on, the message seems legit and a carbon copy of one sent by the company before.

By Alan Buckingham -
data_encryption_tablet

Encrypt all the things! Facebook, Google and WhatsApp to increase privacy and encryption

Privacy and security has always been a hot topic, but never more so than in recent months. The Apple/FBI case has really brought things to a head, enlivening the debate between privacy and security advocates, and those who side with the government. As Apple fights to prevent the FBI from accessing the San Bernardino shooter's iPhone, Facebook, Google and others are looking to increase encryption and lockdown user data even further.

The Guardian has learned that a number of Silicon Valley companies are working on ultra-secure encrypted messaging systems. With President Obama having made a sideways reference to supporting the inclusion of backdoors for government, Facebook is planning to not only bring encryption to Whatsapp's voice messages, but also to bolster the security of Facebook Messenger.

By Sofia Elizabella Wyciślik-Wilson -
Privacy key

80 percent of internet users believe privacy is a fundamental right

People care more about their privacy than ever before according to the latest Consumer Openness Index by open source messaging and office productivity company OpenXchange, with 80 percent believing they have a right to privacy.

The survey of 3,000 Internet users in the US, UK and Germany shows that over the past year, public opinions about data privacy have hardened. The internet-aware public in all regions surveyed are more likely to say they would stop using websites and services if news of a privacy scandal broke.

By Ian Barker -
hands shaking computer monitors

Only collaboration will solve the encryption dilemma

"They who can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety". So goes the quote from Benjamin Franklin, one of the Founding Fathers of the United States, in 1755. Little did he know that over 250 years later, his words would be frequently cited in one of the most complex debates of modern times.

In a world where data is collected, shared and sold as the norm, the liberty vs. security question has never been so relevant. The topic has been brought into the public eye by the UK Home Secretary’s draft Investigatory Powers Bill -- or Snoopers’ Charter -- and honed-in on the issue of encryption. More specifically, whether government agencies should be given the power to access encrypted, private communications, by forcing service providers to hand them over.

By Richard Anstey -
obama_us_flag

Privacy and security killer: Obama supports backdoors to bypass encryption

The on-going battle between Apple and the FBI has brought encryption and security to the fore once again. After remaining silent on the subject for some time, President Obama -- speaking at SXSW -- said that he was opposed the idea of encryption mechanism that are so strong it prevents governmental access.

"If technologically it is possible to make an impenetrable device or system where the encryption is so strong that there is no key, there's no door at all, then how do we apprehend the child pornographer, how do we solve or disrupt a terrorist plot?" he wondered aloud, his almost rhetorical question playing neatly on two of America's biggest fears. He suggested that security keys should be made available to third parties, saying "you cannot take an absolutist view" when it comes to balancing security and privacy. But Obama has a solution: backdoors.

By Sofia Elizabella Wyciślik-Wilson -
cloud padlock

Why cloud security should be a part of software development

The slogan "there is no cloud, it’s just someone else’s computer", accompanied by an image of a worried looking cloud, has been doing the rounds for some time now. It’s overly simplistic but it neatly sums up the mistrust that some computer users have about cloud technology.

The inference being that people who trust the cloud and believe the hype are in some way naïve. The extension of which is that, if you’re giving your data to someone else, how can you be sure it’s safe? This is why cloud security needs to be part of the software development lifecycle.

By Nazar Tymoshyk -
Login screen

UK government launches a fast online identity verification service

A new service has launched in the UK, which will allow the country’s citizens to easily verify their identity online. Called CitizenSafe, it is the brainchild of global specialists in identity data intelligence, GBG.

CitizenSafe was created after a survey had shown that people expect to access government services easily and securely online, and that online identity verification was a key step. It will be integrated within the UK government's gov.uk Verify service, and GBG says it will cut the time needed to verify an identity to mere minutes.

By Sead Fadilpašić -
apple_store_front

Justice Department accuses Apple of false rhetoric, pooh-poohs privacy concerns

Ahead of the hearing due to be held on 22 March, the Justice Department has lashed out at Apple in its latest response to the company's refusal to unlock the San Bernardino iPhone. Playing an emotional game, the DoJ says "Apple deliberately raised technological barriers that now stand between a lawful warrant and an iPhone containing evidence related to the terrorist mass murder of 14 Americans."

It says that only Apple is able to remove the barriers that are currently in the way, "and it can do so without undue burden". Apple has already made it abundantly clear that it will not help the FBI in creating what it describes as a backdoor into the iPhone at the center of the case.

By Sofia Elizabella Wyciślik-Wilson -
privacy_policy

FCC's Tom Wheeler wants to protect internet users' privacy by limiting ISPs' personal data usage

The chairman of the Federal Communication Commission has put forward a set of proposals to protect internet user's privacy. Tom Wheeler wants to place limits on how ISPs are able to use customer data in much the same way that phone companies are regulated.

The amount of unencrypted data ISPs have access to which can be used for advertising and marketing worries Wheeler. The FCC already governs how phone companies can use and resell customer data, and he believes the same rules should be applied to ISPs. More than this, he wants to empower customers so they can choose precisely how their data is used.

By Sofia Elizabella Wyciślik-Wilson -
Load More Articles