Microsoft issued a security advisory this week with details of a zero day vulnerability that affects every supported version of the Windows operating system with the exception of Windows Server 2003. The flaw is very similar to the OLE vulnerability patched earlier this month, which was linked to the Sandworm cyber espionage campaign.
What you need to know about new zero day that hits most supported Windows versions
Comments Off
Categories: General.
How the FIDO Alliance’s U2F could simplify two-factor authentication
We’ve had enough malware campaigns and data breaches to confirm the need for better data protection online. The Universal 2nd Factor (U2F) standard is a step in the right direction, and the first compatible devices are coming out now.
U2F is an open authentication standard. It was initially developed by Google, but it’s now managed by the FIDO (Fast Identity Online) Alliance. The FIDO Alliance also includes household names like Microsoft, Mastercard, Visa, PayPal, Discover, Samsung, and BlackBerry among its members.
Comments Off
Categories: General.
3 simple ways two-factor authentication can protect you when no one else will
It seems like consumer data is compromised in some massive data breach every other week. You should expect the companies you do business with to do everything possible to prevent data breaches and protect your data, but it’s unreasonable to believe it will never happen. It’s up to you to take additional steps to protect your own data, and minimize the potential fallout from a breach as much as you can. One of the best ways to do that is with two-factor authentication.
Comments Off
Categories: General.
Spot phishing scams and don’t take the bait
Can you recognize a phishing scam email when you see one? Do you know what signs to look for to identify a phishing attack, and avoid becoming a victim? In honor of National Cybersecurity Awareness Month, PhishMe has developed an infographic with helpful tips to keep you safe and secure.
PhishMe points out the usual, common-sense things you should do to avoid getting compromised—by either phishing scams or malware exploits. Don’t open unknown file attachments or click on links in suspicious emails, and don’t enter your credentials on login pages linked from email messages.
Comments Off
Categories: General.
Report: Huge spike in mobile malware targets Android, especially mobile payments
Two very predictable traits drive cybercriminals: First, they tend to focus on targets with the highest odds of success. Second, they prefer attacks that generate profit. A new joint report from Kaspersky Lab and INTERPOL underscores how these two factors contribute to concerning trends in mobile threats.
The Mobile Cyber Threats report analyzes mobile malware data collected from Kaspersky’s cloud-based Kaspersky Security Network (KSN) during the period of August 1, 2013 through July 31, 2014, for over 5 million Android smartphones and tablets protected by Kaspersky security products.
Comments Off
Categories: General.
Survey: BYOD security remains spotty, with users unaware or unmotivated about risks
Many organizations have embraced the concept of BYOD (bring your own device), allowing employees to use their own personal smartphones and tablets at work. A new survey from BitDefender, however, suggests that BYOD policies and controls have a long way to go in order to be more secure.
Comments Off
Categories: General.
Survey finds generation gaps in adoption of new tech
Wearable tech and Internet-of-Things (IoT) gadgets are all the rage. A new survey from Acquity Group, though, illustrates how different generations are embracing these new developments.
The study defined three age groups: Millennials (ages 18-25), Generation X (ages 26-35), and Baby Boomers (over age 45). (I guess that group between age 36 and 45 just isn’t very interesting). Overall, Acquity Group found that younger consumers are most likely to adopt connected technologies in the long run, but older consumers are more likely to own certain products already.
Comments Off
Categories: General.
Prevent identity theft with this interactive site
Preventing identity theft starts with you—making sure you’re aware of the threats out there, and how to avoid them.
Choice Loans, a financial lending service based in the UK, has put together a site that can help. It’s an interactive guide to various types of identity fraud, complete with 16 things you can do to detect or respond to them.
Comments Off
Categories: General.
Apple Pay could put an end to data breaches
The retail data-breach epidemic highlighted by Target now has other famous victims, including UPS, Home Depot, and Dairy Queen. If you’ve used a credit card sometime in the past year or two, there’s a very good chance your information has been compromised or exposed by at least one of these data breaches. If you use Apple’s new Apple Pay system, though, such worries just might be behind you.
Comments Off
Categories: General.