PhishFlagger anti-phishing email solution released
Monday, August 19, 2024 by Austin Harris
PhishFlagger, a human-compatible patented phishing solution, recently announced its new patented anti-phishing email solution. The solution validates emails through a unique identifier protocol, PhishCounter, which adds a sequential number in the subject line that identifies all outgoing and inbound emails. The easily implemented system also allows recipients to identif...
Tom Brady NFT sale sparks warning to consumers from experts
Wednesday, February 28, 2024 by Freeman Lightner
An expert has warned those considering purchasing an NFT off the back of the Tom Brady $40.7k sale, as NFT marketplaces saw $38 million stolen by scammers last year.
The findings, pulled together by Smart Betting Guide, analyzed a database recording crypto scams and exploits to identify the most vulnerable platforms and blockchains over the last year - with NFT marke...
AI cybersecurity impacts according to NetLib Security
Monday, December 18, 2023 by Richard Harris
This is an easy call to make: NetLib Security predicts that Artificial Intelligence - Generative AI - will continue to heavily impact the world of cybersecurity, upping the game for defensive players, while giving cybercriminals more tools on the offensive side.
2023 was a year in which AI seemed suddenly to be everywhere. Although AI is not a new field, ChatGPT and ...
ImmuniWeb Neuron web security scanning
Friday, June 10, 2022 by Richard Harris
ImmuniWeb has announced the launch of ImmuniWeb Neuron, a web application and API web security scanning solution that is based on the award-winning ImmuniWeb AI Platform available.
ImmuniWeb Neuron is designed to rapidly scan tens, hundreds, or even thousands of web applications and APIs for vulnerabilities, weaknesses, and misconfigurations. It c...
Protecting source code
Wednesday, October 6, 2021 by Nigel Thorpe
Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...
Cyvatar raises 9 million for cybersecurity as a service model
Monday, June 21, 2021 by Brittany Hainzinger
Cyvatar announced that it has raised $9 million as part of its Series A financing to help scale and serve its rapidly growing customer base and continue to drive the adoption of its innovative cybersecurity-as-a-service (CSaaS) model.
Cyvatar raises 9 million for cybersecurity as a service model
Escalating cybersecurity breaches and the need to addr...
How to avoid mobile phone apps from leaking your personal data
Wednesday, November 18, 2020 by Brittany Hainzinger
Most people have dozens of mobile phone apps installed on their phone, tablet, or even their smartwatch. In fact, the average person has about 60 to 90 mobile phone apps on their phone. Out of all those apps, many of them could be leaking your personal data. How can you protect yourself? One of the primary ways is by installing a VPN, but there are other ways, too. Here...
Match.com gets sued by FTC for using fake love interest ads
Thursday, September 26, 2019 by Austin Harris
This just in from the FTC. The Federal Trade Commission has sued online dating service Match Group, Inc. (Match), the owner of Match.com, Tinder, OkCupid, PlentyOfFish, and other dating sites, alleging that the company used fake love interest advertisements to trick hundreds of thousands of consumers into purchasing paid subscriptions on Match.com.
The agency also al...
A world with no passwords and how FIDO2 can help make it happen
Monday, May 13, 2019 by Richard Harris
93.2 percent of the overall web browser market has embraced FIDO2: Google Chrome, Microsoft Edge, Apple Safari, Mozilla Firefox, and Opera.
The FIDO Alliance is driven by hundreds of global tech leaders across enterprise, payments, telecom, government, and healthcare that have come together in support of the organization’s mission to reduce the world’s re...
Finding website risk levels and reputations gets easier for IT admins
Monday, May 13, 2019 by Richard Harris
NetMotion Software announced NetMotion Reputation, a subscription service that identifies the risk profile and usage categories of hundreds of millions of web domains. Reputation allows IT teams to get visibility into user behavior, including a better understanding of access to risky or inappropriate cloud applications and websites. Customers can also block access if an...
Videoselfie authentication tool launches
Tuesday, February 19, 2019 by Richard Harris
Jumio announced the launch of Jumio Authentication, a new video-selfie authentication that uses biometrics for user authentication, that could be ideal for account logins and high-risk scenarios (e.g., logging in from a foreign IP address or authorizing high-risk transactions such as wire transfers and online purchases). Secure selfie authentication can also be use...
Enterprise security report says mobile workers put data at risk
Wednesday, October 10, 2018 by Austin Harris
According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...
30,000 blacklisted apps hosted on the Google Play Store report finds
Friday, September 21, 2018 by Richard Harris
RiskIQ has released its Mobile Threat Landscape Q2 2018 Report, which analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings show a spike in blacklisted apps headlined by Trojans and Adware, as well as a fascinating shift in tactics by mobile threat actors.
For the second year in a row, RiskIQ observed a sharp increase in black...
Fortnite for Android is a trailblazing risk for mobile banking
Tuesday, August 14, 2018 by Sam Bakken
CEO Tim Sweeny of Epic Games, the publisher of the wildly popular Fortnite game, is on a mission to “advance the openness of all platforms” - not to mention side-step Google’s 30% take of developer proceeds - by distributing Fortnite for the Android platform via their website rather than the Google Play store. I applaud a maverick challenging the statu...
ICO investment guide to review before you leap
Wednesday, February 21, 2018 by Harrison Gross
When reviewing a new cryptocurrency project or vendor, there is a certain amount of due diligence required. The crypto space is notorious for an abundance of charlatans, phishers and scammers which seem to only get more sophisticated and verisimilar by the day. Here is a quick checklist to run through when approaching or being approached by a party or project in crypto....
Using common short codes for mobile app marketing
Friday, February 16, 2018 by Richard Harris
App developers know well the difficulties in marketing their apps. But a highly compelling way to advertise their apps in the context to the real world is being overlooked.Common Short Codes provide an easy way for app developers and brands to get consumers to download an app in context with their current, real-world surroundings. Common Short Codes bring integrity and ...
SlashNext launches AI internet threat protection system
Thursday, November 9, 2017 by Austin Harris
SlashNext announced the company’s broad market release of the SlashNext Internet Access Protection System to protect organizations from cross platform social engineering and phishing, malware, exploits and callback attacks. The system goes beyond first generation signature-based and second generation sandbox-based technologies and deploys artificial intelligence and cog...
New biometric authentication could be a password killer
Wednesday, July 12, 2017 by Austin Harris
Pramati Technologies has announced the ThumbSignIn biometric authentication SaaS platform for mobile and web applications and additionally its certification by the FIDO Alliance. The platform enables enterprises and service providers to deploy strong authentication solutions that reduce reliance on passwords and protect against phishing, man-in-the-middle, and replay at...
Enterprise threat dubbed HospitalGown infests thousands of apps
Tuesday, June 6, 2017 by Richard Harris
Appthority, an enterprise mobile threat protection company, published research on a newly discovered backend data exposure vulnerability, dubbed HospitalGown, that highlights the connection between mobile apps and insecure backend databases containing enterprise data. Appthority documented more than 1,000 apps with this vulnerability, and researched in detail 39 applica...
Ways you can protect yourself on the Internet
Thursday, February 23, 2017 by Richard Harris
Editors note: Guest submission by Anas Baig, a Digital Marketer & Security Enthusiast.Anyone can fall victim to hacking, and this fact is as evident as the shining sun. Every time you go online, you are, by default, vulnerable to cyber attacks. Hackers can steal your credit card info, social security number, username and passwords, or even render your PC completely ...
Security Intelligence Platform from Exabeam launched
Thursday, February 2, 2017 by Richard Harris
Exabeam has announced its new Security Intelligence Platform, designed to decrease the risk of cyber threats for organizations of any size.Recent data breaches continue to demonstrate that security management is broken; attacks using stolen or misused passwords keep rising, and companies cannot detect or respond to them effectively. Breaches now have national and intern...
Bitdefender releases IoT security device at CES 2017
Saturday, January 7, 2017 by Richard Harris
Bitdefender BOX helps with smart device hacking that threatens our new way of being connected with IoT.Bitdefender, a cybersecurity solutions provider, unveils at CES in Las Vegas the next-generation of Bitdefender BOX, the device turning the table on cyber-criminals and revolutionizing the way people protect themselves from malware, hackers, ransomware, phishing and ot...
Ransomware facts and the steps to prevent it on your device
Friday, December 30, 2016 by Richard Harris
As technology advances forward, so does its unintended consequences and evolution of bad people being able to exploit its weaknesses. Reports of one these exploits is sweeping across Europe, its name is ransomware. Ransomware is malware that allows hackers to take control of your computer and all its data, and then hold it hostage via encryption until a certain sum of m...
IBM Security Channels Its Inner XMen with Launch of IBM XForce Red Security Division
Friday, August 5, 2016 by Stuart Parkerson
Someone in charge of naming divisions at IBM must have been a big Sci-Fi fan as is evidenced with IBM Security’s name for the a news security task force - IBM X-Force Red. Yep, that’s the name for a new group of IBM security professionals and ethical hackers whose goal is to help businesses discover vulnerabilities in their computer networks, hardware, and software...
How Frightened Should Android Developers Be Of Stagefright
Wednesday, July 29, 2015 by Richard Harris
Stagefright is a new Android vulnerability which was found and announced by Joshua J. Drake, Zimperium zLabs Vice President of Platform Research and Exploitation. Specifically the company says Stagefright is: “…what we believe to be the worst Android vulnerabilities discovered to date.”Here is a rundown according to Zimperium, “These issues in Stagefright code criticall...
Google Offers Up to $30k Bounties for Discovering Android Vulnerabilities
Friday, June 19, 2015 by Richard Harris
Google has announced a new Android Security Rewards program to encourage the Android developer community to discover vulnerabilities and disclose them to the Android Security Team. The reward level is based on the bug severity and payments are elevated for high quality reports that include reproduction code, test cases, and patches.The program covers security vulnerabil...
An Analysis of the Starbucks Cyber Attack and How To Stay Protected
Wednesday, June 10, 2015 by Amit Ashbel
How much is a cup of coffee really worth? Several weeks ago, many Starbucks customers began reporting their Starbucks card balance emptied and then topped again. On May 13th, Starbucks released a written statement denying the un-authorized activity was a result of a hack or an intrusion to its servers or mobile app. But the hard facts show that indeed customers ha...
OpenDNS Releases Enforcement API for Threat Prevention
Tuesday, May 19, 2015 by Stuart Parkerson
OpenDNS has announced the availability of its enforcement API, which automatically turns threat intelligence generated by an enterprise’s security and incident response teams into threat prevention, providing real-time protection for users and devices. The company also announced two new partnerships with threat intelligence platform providers ThreatConnect and Thre...
Next Generation Email Management Platform Unveiled By Vade Retro
Thursday, November 27, 2014 by Stuart Parkerson
Vade Retro, a European based graymail management company recently launched the world's first Graymail Management platform in the United States. The next-generation email management platform was developed to filter out Graymail in the US. Graymail is an email which the user might have subscribed to and does not want to receive further messages. Email has become a to...
KeyLemon Launches Cloud based Face and Speaker Recognition APIs for Development
Tuesday, October 21, 2014 by Stuart Parkerson
KeyLemon, a creator of biometric ID and motion analysis technologies, has released access to its security recognition via a web service. KeyLemon’s biometric ID provides an alternative to passcodes, key fobs or secret information to facilitate authentication and access control for online assets. Through its Okta Application Network (OAN), Okta provides the ability for u...