Potential Security Vulnerabilities of iOS 9

Potential Security Vulnerabilities of iOS 9

Ahead of the expected iOS 9 announcement at Apple event and following news about a bug prompting iPhone owners to download the new operating system early, please see below comment from Nicko van Someren, CTO, Good Technology, addresses the inevitability of new bugs and undiscovered exploits in places where new code has been written to […]

Stay Safe: Back Up Everything in Physical Form

Back Up Everything in Physical Form

A fierce storm blows through your town in the wee hours of the morning. Upon waking up a few hours later, you discover there appears to be no damage. You make it to your office, and as soon as you walk through the door, your secretary looks at you with a terrified look. “Everything is gone! The power must have fried […]

Ransomware Porn App Took Secret Photos of Users

Ransomware Porn App

Following the revelation that users of pornographic app ‘Adult Player’ are being subjected to ransomware attacks, security experts Raj Samani and John Smith identify why this crime is growing at such an alarming rate. [su_note note_color=”#ffffcc” text_color=”#00000″]Raj Samani, CTO EMEA, Intel Security :  “Ransomware and crypto malware, such as that imposed by pornographic app ‘Adult […]

Are Passwords Dead? How Authentication and Trust Online are Evolving

How Authentication and Trust Online are Evolving

Almost every website and app relies on a username and password combination to authenticate users. And that system, which the Internet is built on, is crumbling. There are several factors that together are diminishing the effectiveness of passwords. First, computing power is increasing exponentially; the computing power needed to compromise a password through a brute-force […]

It’s Time to Think Differently about Security

Encryption is a Red Herring – Segmentation is the key to Effective Security A new month, a new data breach. This time the Office of Personnel Management (OPM), a major U.S. government agency, had to reveal that on top of an initial breach of 4.2 million personal records, an additional 15 million records may have […]