Skip to main content

Security

Docker improves container security and management

posted onFebruary 24, 2016
by l33tdawg

We love Docker. This container technology makes it possible to run four-to-six times the number of server applications as you can with Virtual Machines (VM) on the same hardware. There are only two little problems: Security and management.

Those aren't small problems. Even though businesses are flocking to deploy Docker containers, if you can't nail down the security or management issues, you're playing with fire. That hasn't stopped anyone, but Docker knows darn well it's only a matter of time before its users get burned. So, Docker is addressing both problems.

Researchers close the final loophole in device encryption with the power of nanotubes

posted onFebruary 24, 2016
by l33tdawg

Considering the size and semiconducting characteristics of carbon nanotubes, the prospect of using them to replace silicon is quite tempting. Unfortunately, there are a couple of known obstacles preventing that from being possible, at least for now. For those of us less scientifically informed, carbon nanotubes derive from random combinations of metallic and semiconducting nanotubes. As a result, when wiring up a processor, this makes the act of arranging them as needed an excessive engineering challenge.

Panasonic's Nubo is a security camera you can take pretty much anywhere

posted onFebruary 24, 2016
by l33tdawg

We first saw Panasonic’s Nubo last year at IFA in Berlin, and we were impressed by the innovation behind this cloud-connected home security camera. Already unique for its ability to work free of a Wi-Fi connection, it’s reappeared at Mobile World Congress with several new features.

MasterCard to roll out 'selfie' authentication

posted onFebruary 24, 2016
by l33tdawg

MasterCard will soon allow its customers to verify themselves through facial recognition when making payments after a successful trial of the technology.

This time last year MasterCard said it had partnered with First Tech Federal Credit Union in the US to test the effectiveness of letting customers verify their transactions through facial and voice recognition as well as fingerprint matching. It later expanded the trial to the Netherlands.

The most vulnerable time for hacking revealed

posted onFebruary 24, 2016
by l33tdawg

First thing Tuesday is the most effective time to hit inboxes with bogus invoices and receipts looking to catch people unawares, according to a cybersecurity specialist.

Hackers are targeting busy people who are quickly clearing their inbox for the day ahead, hoping their attack will hit the mark before the IT team has a chance to act.

Rather than linking to sites hosting malware, three-quarters of malicious links sent last year directed their recipients to bogus pages designed to steal passwords and other credentials, says the report from Proofpoint's Human Factor 2016.

Operation Dust Storm Hackers Set Sights On Japan's Critical Infrastructure

posted onFebruary 24, 2016
by l33tdawg

A threat group that has attacked a variety of targets including US defense agencies since 2010, has recently zeroed in all efforts on Japanese critical infrastructure. Though they have not yet been "destructive or disruptive," the cyber espionage group has been quietly, persistently lurking within Japan's power, oil/gas, construction, finance, and transportation industries, according to researchers at the Cylance SPEAR Team.

Instagram rolls out two-factor authentication to improve security

posted onFebruary 17, 2016
by l33tdawg

Instagram's popularity continues to grow, and the social network has started to roll out two-factor authentication to help prevent security breaches.

Until now, logging into Instagram only required a user ID and password, but TechCrunch is reporting that soon users will be able to opt for a temporary code to be texted to them, as a second step in the login process.

Android users warned of malware attack spreading via SMS

posted onFebruary 17, 2016
by l33tdawg
Credit:

Security researchers are warning owners of Android smartphones about a new malware attack, spreading via SMS text messages.

As the team at Scandinavian security group CSIS describes, malware known as MazarBOT is being distributed via SMS in Denmark and is likely to also be encountered in other countries.

Victims’ first encounter with the malware reportedly comes via an unsolicited text message that their Android smartphone receives. The txt message uses social engineering to dupe unsuspecting users into clicking on a link to a downloadable Android application.

IBM X-Force finds multiple IoT security risks in smart buildings

posted onFebruary 15, 2016
by l33tdawg

According to Gartner, "connected things" in smart homes and smart buildings represent 45% of 1.1 billion IoT devices in 2015. For that many devices, it is disconcerting that security pundits are asking whether these "connected things" are secure. However, it's a good enough question that IBM's X-Force Security Research Group has decided to find out.