GalleyCat AppData PageData SocialTimes AllFacebook AllTwitter LostRemote 10,000 Words FishbowlNY FishbowlDC TVNewser TVSpy AgencySpy PRNewser

Posts Tagged ‘mobile security’

Mobile Ads Displace Porn as Best Source for Mobile Malware

fake avMalware is following us from our computer to our phones – so much so it’s now easier to obtain malicious malware from any mobile ads, even if you’re not using your phone to watch porn.

The findings come from Blue Coat: in February of 2014, 1 in 5 attacks on mobile phones actually came from malicious ads. That’s a 400% increase insect Nov. 2012, compared to porn, which fell to only 16% of all attacks. Read more

Mediabistro Course

Get $25 OFF Freelancing 101 

Freelancing 101Freelancing 101 starts in less than a week! Don’t miss your last chance to save $25 on full registration for this online boot camp with code FLANCE25! Starting April 28, this online event will show you the best way to start your freelancing career, from the first steps of self-advertising and marketing, to building your schedule and managing clients. Register now! 

4.6 Million Snapchat Accounts Exposed

snapchatHackers gained access to nearly 5 million Snapchat accounts, posting their usernames and phone numbers to the web New Year’s Eve, according to several reports.

The hackers, identified only by the website name — SnapchatDB.info — told the media they were motivated to publish the file of 4.6 million users’ private information as a way to bring attention to known security flaws in the popular app. They also said that they had kept the last two numbers of each phone number hidden. Read more

FaceCrypt Password App Uses Selfies to Secure Your Personal Data

facecryptFacial recognition usually makes us all a bit suspicious, but this new Facecrypt app harnesses that computational power for good. It’s a password management app that allows you to use your face as an added password. For added security, you can also add Liveness Detection to your password keychain to make sure blinking and other facial movements to thwart pirates who may have photos of you.

Like other facial recognition algorithms, the app does not keep a record of your photo - just measurements of it:

FaceCrypt takes measurements of your face and processes them transparently and quickly into a unique data set. On enrolment, the same measurement process happens again and compared against the original enrolled encrypted face. Of course this will not be 100% like for like since facial position, expression and lighting conditions will have differed. Even with variances, FaceCrypt has built in intelligence to still detect if you are the same person and authorised owner of the vault. Read more

Study: Nine in 10 Mobile Apps Possess Security Flaws

phonesecurityMobile apps often ask for personal data to perform their tasks. “This app would like access to your email address, friends’ list, photos, etc., etc.,” right? And we all just click the “OK, sure” button. A recent study from HP, though, suggests app developers need to focus more on keeping that personal information safe.

Nine out of 10 of the more than 2,000 iOS apps HP tested possessed a vulnerability that could represent a security threat. It also found that 97 percent of mobile apps accessed at least one piece of personal information–and 86 percent of those apps did not have proper measures in place to protect your data from “the most common exploits.” Read more

It’s National Cyber Security Awareness Month, Here are Some Security Tips from Intel

NCSAM-10th-Anniversary-Logo-302x86In a startling and ironic introduction to Cyber Security Awareness Month, design software company Adobe admitted its servers were breached by hackers who accessed usernames, passwords, and financial information from nearly 3 million customers. The breach occurred in August, but the company was not aware of the hack until mid-September when security researcher and journalist Brian Krebs noticed ¬†Adobe’s source code on servers used for previous hacking attempts.

In an announcement on the company’s blog on October 3, 2013, Brian Arkin, Adobe’s Chief Security Officer finally explains the extent of the security breach: Read more

Privacy & Data Management On Mobile Devices: INFOGRAPHIC

Backgroundcheck.org has created an infographic called, “Privacy & Data Management on Mobile Devices,” which explores how phones can put you at risk for sharing your personally identifiable information.

We’ve embedded the entire chart after the jump for you to check out. All media professionals should be aware of mobile security.

Here is more from the graphic: “Today, our phones can be a treasure true of not only memories, but personally identifiable information. This puts us at a disadvantage not only if we lose our phone, but when we download certain apps that quietly amass our data. Here’s a look at how Americans manage these data and security issues.” Read more