Topic: mobile security

Researchers add physical objects into two-factor authentication

As passwords continue to be a problem in today’s modern world, one group of computer researchers is taking a new approach to protecting the web. Researchers from Florida International University and Bloomberg have developed a two-factor authentication solution that depends on physical objects rather than code. We use passwords to unlock sensitive information such as … continue reading

Android vulnerability puts 95% of devices at risk, researcher says

Researchers say they have found the biggest Android security flaws known to date. The vulnerabilities, nestled inside Android’s media playback library Stagefright, are said to affect 950 million Android devices, which amounts to 95% of them. Mobile security researcher Joshua J. Drake, vice president of platform research and exploitation at Zimperium zLabs, discovered the vulnerabilities … continue reading

Developer proposes io.js reconciliation with Node.js, mobile app security issues, gRPC, and Android Pay API—SD Times news digest: Feb. 27, 2015

Mikeal Rogers, a developer on the io.js team and an active member of the Node community, has posted a proposal on GitHub for reconciliation of the io.js fork with Node.js. Rogers posted an open GitHub proposal entitled “Reconciliation Proposal #978,” laying out preliminary plans for the merger, the technical governance structure, proposed working groups, and … continue reading

NIST releases guide to mobile app security

The National Institute of Standards and Technology (NIST) wants to protect users from their mobile devices. The organization has released a new guide designed to improve the security of mobile devices. While mobile applications have helped businesses increase productivity through real-time communication and connectivity, the benefits don’t outweigh the risks that can come with it, … continue reading

Verizon: Mobile threats are on the rise

Developers should guard apps against phishing, while app stores see more malware infiltration … continue reading

HTML Snippets Powered By : XYZScripts.com

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!