ePrivacy Regulation

On 10 January 2017, the European Commission published the official proposal of the revised e-Privacy Regulation, which amends the current e-Privacy Directive. The proposed Regulation on Privacy and Electronic Communications will increase the protection of people’s private life and open up new opportunities for business. Background The current E-Privacy Directive (Directive 2002/58/EC) is part of the EU regulatory …

Continue reading ePrivacy Regulation

Advertisements

NIST: SMS Authentication is not Secure.

Towards the end of July 2016, the National Institute of Standards and Technology (NIST) started the process of deprecating the use of SMS-based out-of-band authentication. Updated guidelines stated that SMS-based two-factor authentication is not secure and should be banned. It is not only insecure but also inconvenient for users, we will explain to you why …

Continue reading NIST: SMS Authentication is not Secure.

Digital Trust essential for digital transformation

It is difficult to trust a company you can not see, the financial institute you never visit, or the online contact you have never met. It is even more difficult to protect, and leverage, your assets now that they have shifted from the physical world to the internet that is always on. The Internet of …

Continue reading Digital Trust essential for digital transformation

OAuth 2.0 insecure: 1 billion Androids vulnerable

Researchers find a widespread risk for users of apps with insecure OAuth 2.0 implementation, which could lead to attackers being able to access the data held within a vulnerable app. Security researchers have discovered a way to target a huge number of Android and iOS apps that could allow them to remotely sign into any …

Continue reading OAuth 2.0 insecure: 1 billion Androids vulnerable

IoT Devices, Security and Trust

Embedded Internet-of-Thing (IoT) and IP-devices are not a new phenomenon. In last Friday’s massive DDoS cyberattack, hackers used ‘internet of things’ devices to launch this high impact attack. Organized networks of connected devices created a massive botnet that threw over 1 trillion bits of data every second at important servers. Many of the devices participating …

Continue reading IoT Devices, Security and Trust

Securing Future European Business at ISSE 2016

ISSE 2016 will take place on 15th and 16th in Paris. Information Security Solutions Europe (ISSE) was founded in 1999 as an initiative of the European Commission Directorate General Information Society. This years theme is: ‘Securing Future European Business’. I was was delighted to receive a speaking invitation for the conference of ISSE 2016.During the 2nd day …

Continue reading Securing Future European Business at ISSE 2016

Support of JAVA and ActiveX stops

As we mentioned last year, well-known plugins such as JAVA will soon stop working in browsers. JAVA, ActiveX, embedded Flash, Silverlight and other plugin based technologies have been victims of some of the largest security threats on the internet in the last few years.(1) Some reports are even stating that JAVA is the biggest vulnerability for US …

Continue reading Support of JAVA and ActiveX stops