Apple is offering a fast option to disable Touch ID in the next version of iOS.
Security researchers pick up angle grinder, drop Â£2k-plus in B-sides chat
B-sides Weighing in at 800kg secondhand, freestanding ATMs - a "safe with a computer on top" - are a logistical nightmare to own and research, security boffin Leigh-Anne Galloway warned delegates at the BSides Manchester infosec conference yesterday.
Verizon says basestation dumps increasingly popular
US telecoms giant Verizon says police are increasingly asking it to cough up massive dumps of cellphone data rather than individual records.
Federal agency addresses the new world of Alexa, smart cameras and IoT
A draft of new IT security measures by the US National Institute of Standards and Technology (NIST) has for the first time pulled privacy into its core text as well as expanded its scope to include the internet of things and smart home technology.
A recent report from the networking giant has said cloud is the ignored dimension where enterprise security is concerned.
9 hours ago SCRUM vs. KanBanIT Toolbox Blogs View Synopsis+1
I had an interesting conversation today with the Director of SW Engineering I work with. He was relating some meetings he was in where various corporate IT leaders were discussing agile methodologies and how to standardize them across the company.
It seems that we have two flavors of what can loosely be called "agile" development going on. The first type was being
Machine learning and code to detect and alert attempts to extract passwords from staff
Security researchers from UC Berkeley and the Lawrence Berkeley National Laboratory in the US have come up with a way to mitigate the risk of spear-phishing in corporate environments.
Facebook announced on Thursday the winners of its 2017 Internet Defense Prize. A team of researchers from the University of California, Berkeley, and the Lawrence Berkeley National Laboratory earned the $100,000 prize for a novel technique of detecting credential spear-phishing attacks in enterprise environments.
1 day ago New Exploit Kit: A Closer LookInfoRiskToday View Synopsis+1
The latest edition of the ISMG Security Report leads with a closer look at a new exploit kit and whether it represents a resurgence in these types of criminal packages. Also featured: a discussion of new vehicle security concerns and communications advice for CISOs.
Cyberattacks continue to get more and more sophisticated, so it's critical that your business is aware of the characteristics of the most common email-based attacks.
Booby-trapped touchscreens can log passwords, install malicious apps, and more.
In volume 22 of Microsoft's Security Intelligence Report, the Redmond giant outlined some of the biggest cyberthreats facing its users.
3 hours ago US DoD, Brit ISP BT reverse proxies can be abused to frisk internal systems - researcherThe Register View Synopsis+1
And how to avoid making the same mistakes
BSides Minor blunders in reverse web proxies can result in critical security vulnerabilities on internal networks, the infosec world was warned this week.
Before proceeding further, a brief comment on the use of the terms "proprietary" and "open system" is probably in order.