University researchers have raised concerns about the security of web-based password managers that free people from the burden of having to remember website credentials.
Scientists at the University of California, Berkeley, studied five password managers and found vulnerabilities in diverse features like one-time passwords, shared passwords and "bookmarklets," which are used to sign into websites on mobile browsers.
In a carefully and respectfully worded post on Apple’s Chinese website the company denied claims made on Chinese television that iPhones were a concern to national security.
The UK will soon become the third largest 4G market in Europe, with nearly 8 million people connected, but with growing 4G adoption there are greater risks to privacy and personal data than ever before, experts warn.
A major new threat to mobile users comes from the switch to IP (Internet Protocol), according to security firm Cloudmark. 4G mobile networks are all-IP, whereas 3G networks are a combination of IP and mobile signalling protocols (SS7).
What is the information security triad? Just about everyone knows the answer to this question is CIA – Confidentiality, Integrity, and Availability. Security professionals, service providers, and technology vendors are responsible for these three infosec pillars in one way or another.
CISOs also take part of CIA oversight, but their responsibilities extend beyond confidentiality, integrity, and availability alone. In fact, the CISO role is changing rapidly and becoming so critical that these security executives deserve a cybersecurity triad of their own.