Mobile Presents New Security Challenges

By Erik Peterson | 4/22/13 10:14 PM

In the post-PC era of corporate computing, IT departments are faced with an evolving threat landscape. Ultra portable devices are here to stay and causing security professionals to rethink approaches traditionally employed to secure servers, desktops and laptops. It may be safe to say that the state of the art mobile phone or tablet security is a generation ahead of the security options available to their ancestors. However, the threat is even more difficult to mitigate when the attacker can have physical access to the mobile device.

Read More >

A Patent Infringement On SSL/TLS?

By Robert Vamosi | 11/13/12 1:58 AM

Marshall, Texas-based TQP Development is filing patent infringement suits against Google, Adobe, and others, claiming that it owns the patents on secure sockets layer and transport layer security protocols.

Read More >

Areas to Test For Mobile App Security

By Robert Vamosi | 5/2/12 5:51 AM

Admitting that there are many ways to test a mobile app, one security expert says there are three important areas that must be tested no matter what.

Read More >

Generation Flaw Found in RSA Keys

By Robert Vamosi | 2/15/12 2:21 AM

With a witty title, the academic paper "Ron Was Wrong, Whit Was Right" is sure to stir controversy int he days going into the annual RSA conference in San Francisco later this month. "Ron" is Ron Rivest, the "R" in the RSA algorithm, while "Whit" is Whit Diffe, author of the Diffe-Hellman algorithm. Both are gentleman are the authors of popular public key encryption systems, however researchers now say that "RSA is significantly riskier than for \single-secret" ones such as ElGamal or (EC)DSA which are based on Diffe-Hellman."

Read More >

DeviceLine Podcast for January 13, 2012

By Robert Vamosi | 1/13/12 5:58 AM

... And we're back on the air.

Read More >

Smart Meters Hacked, Part Two

By Robert Vamosi | 1/10/12 4:30 AM

Yesterday, DeviceLine talked about two German researchers who could intercept and decipher what videos you were watching by eavesdropping on your smart meter. Today, DeviceLine is talking about a more serious concern: spoofing energy usage data from your smart meter.

Read More >

Smart Meters Reveal Movie and TV Viewing Habits

By Robert Vamosi | 1/9/12 3:59 AM

German researchers, presenting at the 28th Chaos Communication Congress (28c3), say they can guess what's on your digital TV based on unencrypted signals from certain Smart Meters.

Read More >

Wi-Fi Users Beware: Firesheep on the Loose in Your Gmail, Facebook, and Other Online Accounts

By JDavis | 2/23/11 7:36 AM

Firesheep, the latest threat to Wi-Fi users, is free, open source, and easy for even the intermediate user to figure out. In fact, over the past three months, more than 1 million individuals have downloaded Firesheep and have the ability to see what other Wi-Fi users on an unsecured network are doing.

Read More >

Potential Vulnerability of SSL on Devices

By JDavis | 12/20/10 4:42 AM

Today, many embedded devices rely heavily on SSL encryption through the use of hard-coded keys located within the device's firmware. In this scenario, all devices running a given firmware version are using the same private SSL key, resulting in a potential security vulnerability that could put data at risk.

Read More >

Security Flaw Found in Popular New iPhone App

By JDavis | 11/21/10 8:45 AM

The new iPhone photo sharing app "Instagram" has been a quick success, garnering hundred of thousands of users in its first few weeks of availability. However, according to a recent article at TechCrunch, the app has a major security flaw that could be leaving this massive user base vulnerable.

Read More >
COMMENTS