Google wants to kill passwords with Project Abacus, which Google said will become available on Android devices by the end of 2016.
Tag Archives: Web Security
Crypto Innovator, Entrepreneur Jon Callas Rejoins Apple
Apple has hired cryptography pioneer Jon Callas for a third time. Callas, who previously at Apple helped design and implement encryption systems for Macs, was most recently at Silent Circle.
LinkedIn is Latest Contributor to Breach Fatigue
Expert Troy Hunt waxes on last week’s LinkedIn data dump of 117 million credentials and how it reflects on a new breed of hackers.
Persistent EITest Malware Campaign Jumps from Angler to Neutrino
The tenacious EITest malware campaign is being refueled by the fact it is shifting from the Angler exploit kit to the Neutrino exploit kit.
SWIFT Network Doubles Down on Security
SWIFT reminds banks of their responsibility in securing their access to the financial network, and creates a centralized information sharing resources for users.
Three Exploit Kits Spreading Attacks for Recent Flash Player Zero Day
The Angler Exploit Kit is exploiting the latest Flash zero day and is moving Dridex banking malware. The Magnitude and Neutrino exploit kits have also integrated the 0day.
Instagram Patches Brute-Force Authentication Flaws
Facebook paid researcher Arne Swinnen a $5,000 bounty for a pair of authentication vulnerabilities in Instagram that enabled brute-force attacks against usernames and passwords.
Google Allo a Clash of Privacy and Functionality
Google Allo has an end-to-end encryption capability powered by Signal, but it’s not turned on by default because it would interfere with an artificial intelligence powering Google Assistant.
LinkedIn Slams Breach Data Reseller With Cease and Desist Order
LinkedIn is striking back against websites that are attempting to monetize the 117 million usernames and passwords stolen from the company as part of a 2012 data breach.
Protecting Cloud APIs Critical to Mitigating Total Compromise
When it comes to cloud computing, APIs more or less drive everything, but in the eyes of some researchers, existing security controls haven’t kept pace.