Spammers flood Inboxes with creative Pokémon Go offers

Spammers flood Inboxes with creative Pokémon Go offers

by HOTforSecurity , on 26.07.2016

Everyone, and I mean everyone, is taking advantage of the Pokémon Go frenzy to lure people in their shops, on their websites and even at shady physical locations to mug unsuspecting players. And spammers make no exception as they bombard Inboxes with commercial messages that advertise all sorts of products and services, from in-game PokéCoins [and#8230;] read more

1.6 Million Account Records Stolen in Clash of Kings Hack

1.6 Million Account Records Stolen in Clash of Kings Hack

by HOTforSecurity , on 26.07.2016

We’ve all played games on our phones at some point without considering the risks to all the personal data stocked in our phone. This was probably the case with Clash of Kings players who recently fell victim to a major hack. Clash of Kings is a multi-player, real-time strategy game “in the $36.9 billion mobile [and#8230;] read more

IoT- a bigger business priority than mobile, cloud and analytics

IoT- a bigger business priority than mobile, cloud and analytics

by HOTforSecurity , on 26.07.2016

With IoT turning into an essential component of IT strategies, businesses spend around 24 percent of their budget on IoT projects, taking ground from mobile, cloud and analytics, according to the Vodafone IoT Barometer 2016 report.  As businesses want to capitalize on IoT, 63 percent said they will deliver clearly defined, working IoT projects in [and#8230;] read more

The Array of Things: Chicago’s very own ‘fitness tracker’

The Array of Things: Chicago’s very own ‘fitness tracker’

by HOTforSecurity , on 25.07.2016

The Array of Things is a new modular sensor network in Chicago that gathers real-life data about the city’s infrastructure, air quality, climate and noise. The node components include hundreds of environmental sensors, air quality sensors, light and infrared sensors, Linux node controllers, and a node power manager. The data collected is for free public [and#8230;] read more

iOS Vulnerability Allows Remote Code Execution Triggered by Image Files

iOS Vulnerability Allows Remote Code Execution Triggered by Image Files

by HOTforSecurity , on 25.07.2016

A vulnerability in the way Apple iPhone, iPad, Apple Watch, Mac or Apple TV software processes images could allow attackers to gain full control over devices by sending victims malicious Tagged Image File Format (TIFF) files. Triggering a buffer overflow in Apple’s Image I/O API, an attacker could allegedly run their own malicious code on [and#8230;] read more

Are we the owners of our data?

Are we the owners of our data?

by HOTforSecurity , on 25.07.2016

Mobile phones will be overshadowed in 2018 by the Internet of Things, which will become “the largest category of connected devices,” says the Ericsson Mobility Report. In as little as five years, there will be 9B mobile subscriptions, 7.7B mobile broadband subscriptions, and 6.3B smartphone subscriptions, Ericsson estimates, and 5G will play a significant role [and#8230;] read more

NIST Proposes Ban on SMS-Based Two-Factor Authentication

NIST Proposes Ban on SMS-Based Two-Factor Authentication

by HOTforSecurity , on 25.07.2016

The National Institute for Standards and Technology (NIST) has released a Digital Authentication Guideline draft proposing that all services abandon SMS-based two-factor authentication and use tokens and software cryptographic authenticators. Because messages can be redirected to a VoIP service and not an actual mobile number, NIST believes SMS-enabled two-factor authentication is vulnerable to attacks. A [and#8230;] read more

Businesses Don’t Feel Protected by their IT Security Strategy

Businesses Don’t Feel Protected by their IT Security Strategy

by HOTforSecurity , on 22.07.2016

Some 600 IT professionals in the United States were interviewed to figure out best practices that could help businesses reduce infrastructure risks and raise awareness of the importance of insuring their most valuable information. In the past year, “the cost of attacks against companies’ knowledge assets […] averaged more than $5 million,” with companies reporting [and#8230;] read more

EU wants to protect whistle-blowers as they provide ‘valuable public service’

EU wants to protect whistle-blowers as they provide ‘valuable public service’

by HOTforSecurity , on 22.07.2016

As whistle-blowers have already become common news in the public agenda, members of the European Parliament (MEPs) started in July several discussions about the best way to protect them. Although whistle-blowers provide an important service to society, itand#8217;s not without risk as they often face prosecution. This June, Antoine Deltour was convicted of theft for [and#8230;] read more

Edward Snowden’s new case design detects if your iPhone is broadcasting its location

Edward Snowden’s new case design detects if your iPhone is broadcasting its location

by HOTforSecurity , on 22.07.2016

NSA whistleblower Edward Snowden has teamed up with hardware hacker Andrew and#8220;Bunnieand#8221; Huang to design an iPhone accessory that could help protect journalists working in dangerous parts of the world. The problem is that, for all their convenience, smartphones are perfect tracking devices, and their cellular signals can be used by governments to determine the [and#8230;] read more

Next >>