In times of digital transformation, new innovations follow each other at lightning speed.For years, we saw improvement upon improvement in computers and components, and everything had to be faster and newer.More recently, attention has shifted to which technical components can contribute to a better overall solution to increase digital resilience. And authentication plays a crucial …
Category: Device
Simple security plan for IoT devices
The next big wave of cyber attacks may come from the millions of Internet of Things devices out there. If you're making or deploying IoT devices you need to up your security plan. Security is not an add-on feature; it must be built into the foundation of any given device. The level of security held …
NIST: SMS Authentication is not Secure.
Towards the end of July 2016, the National Institute of Standards and Technology (NIST) started the process of deprecating the use of SMS-based out-of-band authentication. Updated guidelines stated that SMS-based two-factor authentication is not secure and should be banned. It is not only insecure but also inconvenient for users, we will explain to you why …
OAuth 2.0 insecure: 1 billion Androids vulnerable
Researchers find a widespread risk for users of apps with insecure OAuth 2.0 implementation, which could lead to attackers being able to access the data held within a vulnerable app. Security researchers have discovered a way to target a huge number of Android and iOS apps that could allow them to remotely sign into any …
Continue reading OAuth 2.0 insecure: 1 billion Androids vulnerable