Google is releasing the first reCAPTCHA Android API for Google Play Services. The API will provide a streamlined user experience on mobile and include the latest invisible reCAPTCHA technology. Google first announced Invisible reCAPTCHA in March as a way to run risk analysis behind the scenes, allowing users to pass through the system with zero … continue reading
A group of researchers want to help the cybersecurity community find hidden threats in their solutions. Together, 17 cybersecurity experts have teamed up to launch threathunting.org. The new online hub, sponsored by Sqrrl, provides practical resources, expert research and training material on how to hunt security threats. “There are a lot of people who want … continue reading
The cloud is no longer an afterthought, it is a competitive advantage. According to a new Insight-sponsored report by Harvard Business Review Analytic Services, businesses are turning to the cloud for agility, data capabilities, customer and user experiences as well as cost savings. “A company’s IT environment should work for them by enabling them to … continue reading
A new decentralized authentication protocol for websites and apps has been released. The SecureLogin Authentication Protocol 1.0 is a password replacement that does not believe in giving third parties access to log into your account from anywhere. The solution aims to solve password reuse, usability, central authority, man-in-the-middle, and malware. “Classic passwords/2FA are poorly designed, … continue reading
Though many in IT focus on external threats, I believe that the ‘enemy within’ may be just as damaging. Addressing the human element, both malicious and unintentional, may generate some of the greatest returns on security investment. Counter to conventional wisdom, the majority of breaches are not due to malicious intent. According to Ponemon, 52% … continue reading
After weeks of tease, creator of Android Andy Rubin has unveiled a new smartphone: The Essential Phone. The phone is being introduced as part of Rubin’s latest company, Essential. According to Rubin, the belief behind Essential is that devices should be personal property, play well with others, shouldn’t become outdated, and should assist the user. … continue reading
Malicious hackers will find any way to deliver a cyberattack. This week, Check Point Software researchers discovered a new method for perpetrators, one which is threatening millions of users: Attacking by subtitles. According to Check Point’s research, the new possible attack vector delivers the cyberattack through movie subtitles that are loaded by the user’s media … continue reading
There’s a new ransomware attack that has affected several organizations globally, and although it’s slow-moving, security experts are urging companies to keep their antivirus programs up-to-date, as well as their software. The ransomware — dubbed WannaCry (WanaCrypt0r 2.0/WCry) — has hit Britain’s National Health Service, some of Spain’s big companies, and has spread across Russia, … continue reading
As an effort to help users create secure passwords, researchers from Carnegie Mellon University and the University of Chicago have developed a new solution that provides password advice. The new password meter not only tells users in real time whether or not their password is good, but it offers feedback and advice on how the … continue reading
We’ve heard it all before. Don’t reuse passwords. Don’t use easy-to-guess passwords. Don’t give away your passwords. Sound familiar? These tips are crucial to protecting user data and information, but it still seems like app and website users are not “getting it.” In honor of World Password Day, we thought it was time to revisit … continue reading
The world of the Internet of Things is still fairly new, and many things — namely security — still need to be addressed. Cloudflare is taking a new approach to protecting devices with Orbit, a private network for IoT. According to the company, there are too many IoT solutions suffering from DDoS and hack attacks. … continue reading
Developers will never be responsible for all of security in an organization, but if they keep up with best practices, resources, and find new ways to secure and deliver good code, they could play a key role in developing resilient software. Today, most firms have a software security group (or SSG) or a product security … continue reading