Topic: cybersecurity

reCAPTCHA

reCAPTCHA Android API, Hortonworks DataFlow 3.0, Blockly 1.0 — SD Times news digest: June 12, 2017

Google is releasing the first reCAPTCHA Android API for Google Play Services. The API will provide a streamlined user experience on mobile and include the latest invisible reCAPTCHA technology. Google first announced Invisible reCAPTCHA in March as a way to run risk analysis behind the scenes, allowing users to pass through the system with zero … continue reading

Photo credit: Katy Levinson via Visualhunt.com / CC BY-SA

New online resource helps detect cybersecurity threats

A group of researchers want to help the cybersecurity community find hidden threats in their solutions. Together, 17 cybersecurity experts have teamed up to launch threathunting.org. The new online hub, sponsored by Sqrrl, provides practical resources, expert research and training material on how to hunt security threats. “There are a lot of people who want … continue reading

cloud

The benefits of cloud computing, Rust 1.18, and intelligent tracking prevention in WebKit — SD Times news digest: June 9, 2017

The cloud is no longer an afterthought, it is a competitive advantage. According to a new Insight-sponsored report by Harvard Business Review Analytic Services, businesses are turning to the cloud for agility, data capabilities, customer and user experiences as well as cost savings. “A company’s IT environment should work for them by enabling them to … continue reading

SecureLogin Authentication Protocol 1.0, GDB 8.0, Boundless Suite 4.10, Audioburst audio API released — SD Times news digest: June 5, 2017

A new decentralized authentication protocol for websites and apps has been released. The SecureLogin Authentication Protocol 1.0 is a password replacement that does not believe in giving third parties access to log into your account from anywhere. The solution aims to solve password reuse, usability, central authority, man-in-the-middle, and malware. “Classic passwords/2FA are poorly designed, … continue reading

Addressing the ‘enemy within’ with best security practices

Though many in IT focus on external threats, I believe that the ‘enemy within’ may be just as damaging. Addressing the human element, both malicious and unintentional, may generate some of the greatest returns on security investment. Counter to conventional wisdom, the majority of breaches are not due to malicious intent.  According to Ponemon, 52% … continue reading

Essential by Andy Rubin

The Essential Phone, IBM cybersecurity initiatives, and Nile.js — SD Times news digest: May 30, 2017

After weeks of tease, creator of Android Andy Rubin has unveiled a new smartphone: The Essential Phone. The phone is being introduced as part of Rubin’s latest company, Essential. According to Rubin, the belief behind Essential is that devices should be personal property, play well with others, shouldn’t become outdated, and should assist the user. … continue reading

Check Point discovers new attack vector through media player subtitles

Malicious hackers will find any way to deliver a cyberattack. This week, Check Point Software researchers discovered a new method for perpetrators, one which is threatening millions of users: Attacking by subtitles. According to Check Point’s research, the new possible attack vector delivers the cyberattack through movie subtitles that are loaded by the user’s media … continue reading

What is the WannaCry ransomware, and why should organizations be concerned?

There’s a new ransomware attack that has affected several organizations globally, and although it’s slow-moving, security experts are urging companies to keep their antivirus programs up-to-date, as well as their software. The ransomware — dubbed WannaCry (WanaCrypt0r 2.0/WCry) — has hit Britain’s National Health Service, some of Spain’s big companies, and has spread across Russia, … continue reading

Passwords

Researchers deliver new password solution, Progress Sitefinity 10, and Dell Technologies Capital — SD Times news digest: May 9, 2017

As an effort to help users create secure passwords, researchers from Carnegie Mellon University and the University of Chicago have developed a new solution that provides password advice. The new password meter not only tells users in real time whether or not their password is good, but it offers feedback and advice on how the … continue reading

SD Times Blog: Make passwords a priority for World Password Day

We’ve heard it all before. Don’t reuse passwords. Don’t use easy-to-guess passwords. Don’t give away your passwords. Sound familiar? These tips are crucial to protecting user data and information, but it still seems like app and website users are not “getting it.” In honor of World Password Day, we thought it was time to revisit … continue reading

Cloudflare announces IoT protection, Orbit

The world of the Internet of Things is still fairly new, and many things — namely security — still need to be addressed. Cloudflare is taking a new approach to protecting devices with Orbit, a private network for IoT. According to the company, there are too many IoT solutions suffering from DDoS and hack attacks. … continue reading

man on a computer

Free learning resources and tools for security savvy developers

Developers will never be responsible for all of security in an organization, but if they keep up with best practices, resources, and find new ways to secure and deliver good code, they could play a key role in developing resilient software. Today, most firms have a software security group (or SSG) or a product security … continue reading

1 4 5 6 7 8 17
DMCA.com Protection Status