Blog Posts Tagged with "SMS"

37d5f81e2277051bc17116221040d51c

What Are the Risks of Mobile Spam?

June 05, 2012 Added by:Robert Siciliano

While spam is mostly annoying, it can also pose some risks. You could even be tricked into paying for products and services that turn out to be illegitimate or nonexistent. Spam can also be used to distribute Trojans, spyware, and exploit code that can infect your mobile device or steal your information...

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Follow Up to the Out of Band Authentication Post

May 16, 2012 Added by:Brent Huston

Sadly, there are more than a few who are struggling to get OOBA right or done at all. As with most things, it helps to do a little research. Organizations should perform due diligence on their vendors and factor vendor risks into the equation of purchases and project planning...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Consumer Banking Security Products and Services

May 10, 2012 Added by:Robert Siciliano

All the conveniences of digital banking have its set of risks which requires upgrades in card technologies and authentication. In response banks have provided numerous methods for protecting your personal information and also making your banking experience more secure...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Targeting of Android Devices Leads Malware Trends for 2012

February 24, 2012 Added by:Headlines

"Smartphones and tablets are finally delivering consumers with these converged and connected experiences we've been promised for so long. But this is a double edged sword: as smart device usage becomes more sophisticated, so too are cyber criminals' methods of attacking..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Mandatory Data Retention, Smart Meter Hacks and Silent SMS

January 23, 2012 Added by:Electronic Frontier Foundation

Silent SMS delivers a text message without the user being aware, but leads to the creation of a log with the cell phone company that reveals what cell phone towers the phone was closest to, revealing the phone’s location to help with tracking...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Windows Phone Denial of Service Attack Vulnerability

December 14, 2011 Added by:Dan Dieterle

"The attack is not device specific and appears to be an issue with the way the Windows Phone messaging hub handles messages. The bug is also triggered if a user sends a Facebook chat message or Windows Live Messenger message to a recipient..."

Comments  (0)

Aecf1189abe745df32ec68f5864649a6

Fraudsters Defeat Poor Risk Management - Not Two-Factor Authentication

December 08, 2011 Added by:Nick Owen

Carriers are not incentivized to secure their users accounts. SMS is really just an email sent to a phone over a provider that barely cares about security. 99% of SMS messages don't require security so don't expect the carriers to add any soon...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

SpyEye Trumps Mobile Banking SMS Security Systems

October 06, 2011 Added by:Headlines

"This latest SpyEye configuration demonstrates that out-of-band authentication systems, including SMS-based solutions, are not fool-proof... Using a combination of MITB technology and social engineering, fraudsters... fly under the radar of fraud detection systems..."

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

Security: What Was Old is New Again

September 06, 2011 Added by:Craig S Wright

So, when all is said and done, we have not really changed much as a species. We love to believe that we as a generation are forging something new and facing problems that no other has faced before, but in reality, the analogy remains as it is always likely to remain. Change is the only constant...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Lessons from Black Hat - It's Easier to be the Bad Guy

August 08, 2011 Added by:Rafal Los

This is real-life attacking. Attackers have time on their side, and know that it is human nature to over-protect the things we value, but to forget to protect those things that we feel are not-so-important... even though they are often connected to those super-critical things...

Comments  (0)

485f5553442ebdfbfa4926166697c319

The Problem with Two-Factor Authentication Solutions

May 15, 2011 Added by:Roman Yudkin

It's great news that more websites are strengthening online authentication. When one considers how much sensitive, personal information people share on the Web, relying on a single layer of password protection simply is not enough...

Comments  (7)

37d5f81e2277051bc17116221040d51c

Mobile Banking Becoming an E-Commerce Staple

April 29, 2011 Added by:Robert Siciliano

Enhanced security with SMS transaction notifications and the ability to turn card accounts on or off, and new technologies like mobile check deposit, in which you simply take a cell phone picture of the check, are contributing to the increasing popularity of mobile banking...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Faking It - When is Two Factor Authentication Not?

February 28, 2011 Added by:Rafal Los

Take a look at the authentication scheme from a 360-degree view and see if the strong authentication 2-factor provides extends to all platforms (mobile device? HTML-only?) If not, then your account is protected by the lowest common denominator, for most sites that's a simple username and password...

Comments  (15)

Af2769c2480db78c589b811b428782b0

Are We Admitting Defeat on Mobile Security?

February 17, 2011 Added by:Lee Mangold

Never before has the attacker had the ability to listen to phone calls, read emails, read SMS messages, geo-locate, watch and listen in on conversations of the victim all at the same time. This is what you call pwnd...

Comments  (0)