Fujitsu has announced plans to launch its digital payment system PalmSecure Technology in Europe that is a security solution for biometric identification Fujitsu has announced plans to launch its digital payment system PalmSecure in Europe that is a security solution for biometric identification, which is offering the perfect user authentication for payment scenarios. It operates touchless, highly […]
The IRS detected roughly unauthorized attempts using 464,000 unique SSNs, and 101,000 attempts allowed crooks in generating PINs. The U.S. Internal Revenue Service (IRS) recently confirmed that cyber criminals abused the Electronic Filing PIN application. The Electronic Filing PIN application is running on irs.gov and allows taxpayers to generate a PIN that they can use to file tax […]
It is hard to believe but the RSA Conference registration page is collecting Twitter credentials sending them back to an RSA server, in-security by design! Security experts from Twitter recently made a singular discovery, the final step of the registration page on the RSA Conference website was requesting user’s Twitter credentials and sending them to the […]
SplashData has published its fifth annual report on most used passwords in 2015, including the list of the Worst passwords of the year. For the fifth time, experts from the SplashData security firm have published a report, titled “Worst Passwords of 2015”  that analyzes the use of passwords in 2015. The researchers compiled the annual report with data […]
According to a group of researchers from the University of Trier two critical flaw affects the oAuth 2.0 authentication protocol. The OAuth 2.0 authentication protocol is widely used on social networking sites, every day billion of users access their profiles on Facebook and Google+ using it. According to researchers Daniel Fett, Ralf KĂŒsters and Guido […]
The researchers Hector Marco and Ismael Ripoll have found that the Grub2 authentication could be easily defeated by hitting backspace 28 times. A couple of researchers from the University of Valencia’s Cybersecurity research group, Hector Marco and Ismael Ripoll, have found that the Grub2Â bootloader is plagued by a serious vulnerability that can be exploited by […]
The German researcher Starbug, has demonstrated that it is possible to extract everyoneâs smartphone PIN code from any selfie âimage,â is biometrics secure? The German researcher Jan Krissler, aka Starbug, has demonstrated that it is possible to extract everyoneâs smartphone PIN code from any selfie âimageâ … and much more! Jan Krissler is a popular hacker, he […]
According to a senior fellow for Lockheed IT, the National Security Agency has tested the use of smartphone-swipe recognition technology dubbed Mandrake. The NSA has developed a new technology, dubbed “Mandrake“, that can identify users from the way they swipe strokes and text on a smartphone screen. The news was reported by officials with Lockheed […]
The Internal Revenue Service (IRS) was breached by hackers that “used an online service provided by the agency” to access data for more than 100,000 taxpayers. According to the Associated Press, the Internal Revenue Service (IRS) suffered a data breach, hackers “used an online service provided by the agency” to access data for more than 100,000 taxpayers. The […]
Security researchers at FireEye have discovered a vulnerability in the Samsung Galaxy S5 that allows hackers to clone fingerprints. Samsung Galaxy S5 and other âunnamed Android devicesâ could leak user fingerprints to hackers that can clone them. According to security experts at FireEye, although Samsung implements encryption mechanism to protect user fingerprints archived on the mobile […]