Meet Matrix, an Open Standard for De-centralized Encrypted Communications

In the early days of the internet, communication was by email. Originally siloed by companies like Compuserve, AT&T and Sprint so that messages could only be exchanged with others on the same system, email is now ubiquitous.

In the early days of the internet, communication was by email. Originally siloed by companies like Compuserve, AT&T and Sprint so that messages could only be exchanged with others on the same system, email is now ubiquitous. Pretty much anyone can communicate with anyone else without worrying about app or device or browser.

Continue reading “Meet Matrix, an Open Standard for De-centralized Encrypted Communications”

Wave of “Food Fraud” Reported at UK’s Deliveroo Service

BBC Watchdog (a consumer protection television program) is today airing a report on ‘food fraud’ against the UK-based Deliveroo service. Food is ordered via the Deliveroo iOS or Android apps, and delivered to the customer.

BBC Watchdog (a consumer protection television program) is today airing a report on ‘food fraud’ against the UK-based Deliveroo service. Food is ordered via the Deliveroo iOS or Android apps, and delivered to the customer. It appears, however, that scores of customers have recently been charged for food they didn’t order; food that was actually delivered to complete strangers.

Continue reading “Wave of “Food Fraud” Reported at UK’s Deliveroo Service”

Evaluating Risks to Identity and Access When Moving to the Cloud

Are Too Many Companies Putting Identity and Access at Unnecessary Risk in Their Move to the Cloud?

I was chatting with the CSO of a Fortune 500 company a couple of weeks ago and the topic came around to cloud services.

Are Too Many Companies Putting Identity and Access at Unnecessary Risk in Their Move to the Cloud?

Continue reading “Evaluating Risks to Identity and Access When Moving to the Cloud”

TeleCrypt Ransomware’s Encryption Cracked

TeleCrypt, the file encryption ransomware that abuses Telegram API for communication, has had its encryption cracked just two weeks after the threat was originally detailed.

The ransomware abuses the instant messaging service Telegram for command and control (C&C) communications.

TeleCrypt, the file encryption ransomware that abuses Telegram API for communication, has had its encryption cracked just two weeks after the threat was originally detailed.

Continue reading “TeleCrypt Ransomware’s Encryption Cracked”

Five Easy Ways To Build Security Into The Internet Of Things

IoT security is at the forefront of everyone’s mind these days due to a huge uptick in DDoS attacks coming from our newly connected devices. So far, we’ve seen DVRs and video cameras fall victim and become mindless drones in a malicious botnet army.

IoT security is at the forefront of everyone’s mind these days due to a huge uptick in DDoS attacks coming from our newly connected devices. So far, we’ve seen DVRs and video cameras fall victim and become mindless drones in a malicious botnet army. After 20 years of partnering with enterprises to build software that deploys inside, outside and around their firewalls, I’ve learned that there are a few basic things we should always include when creating new IoT solutions to protect our creations and our companies.

Continue reading “Five Easy Ways To Build Security Into The Internet Of Things”

Why Online Shopping Fraud Is Expected To Jump 43% This Holiday Season And How To Protect Yourself

The holiday shopping season isn’t all wish lists, massive sales and beautifully wrapped gifts.

Unfortunately, along with millions of transactions comes a high incidence of fraud — and the nature of that fraud is changing this year due to the shift over the last year or so to EMV, or chip, cards.

The holiday shopping season isn’t all wish lists, massive sales and beautifully wrapped gifts.

Continue reading “Why Online Shopping Fraud Is Expected To Jump 43% This Holiday Season And How To Protect Yourself”

Organizations in Asia Targeted With InPage Zero-Day

Attacks launched recently against financial and government organizations in Asia leveraged a zero-day vulnerability in the InPage word processor, Kaspersky Lab reported on Wednesday.

InPage is a word processor for languages such as Urdu, Persian, Pashto and Arabic.

Attacks launched recently against financial and government organizations in Asia leveraged a zero-day vulnerability in the InPage word processor, Kaspersky Lab reported on Wednesday.

Continue reading “Organizations in Asia Targeted With InPage Zero-Day”

Cyberspies Target Taiwan Government, Energy Sector

The threat group behind the cyber espionage campaign dubbed “Tropic Trooper” continues to target Taiwan, including government organizations and the country’s energy sector, Palo Alto Networks reported on Tuesday.

Tropic Trooper was first analyzed last year by Trend Micro.

The threat group behind the cyber espionage campaign dubbed “Tropic Trooper” continues to target Taiwan, including government organizations and the country’s energy sector, Palo Alto Networks reported on Tuesday.

Continue reading “Cyberspies Target Taiwan Government, Energy Sector”

High-assurance identity top priority for government and finance

Creating persistent identities that are validated to the right trust levels is key for online banking, insurance and legal services, according to Sandy Porter, co-founder of identity assurance firm Avoco Secure.

Creating persistent identities that are validated to the right trust levels is key for online banking, insurance and legal services, according to Sandy Porter, co-founder of identity assurance firm Avoco Secure.

Continue reading “High-assurance identity top priority for government and finance”

Customer identity evolves over time, says Gigya

Organisations should understand that getting to know the customer is building identity progressively, according to Rooly Eliezerov, co-founder of customer identity firm Gigya.

Download this free guide

Your exclusive guide to CIO trends

Organisations should understand that getting to know the customer is building identity progressively, according to Rooly Eliezerov, co-founder of customer identity firm Gigya.

Continue reading “Customer identity evolves over time, says Gigya”