-
U.K. businesses complacent about safety of intellectual property
A new survey finds that many companies understand the need to protect IP but fail to do anything about it
-
-
Five myths about two-factor authentication
Too many organizations allow themselves to be vulnerable to cybercrime because of prevailing myths about the cost, inconvenience, and efficacy of two-factor authentication; close examination reveals these myths to be just that — myths
-
-
A first: quantum cryptography used within a commercial network
European consortium demonstrates transmission of quantum-encrypted data within commercial telecommunications network
-
-
Age-guessing software has security, commercial applications
Fighting Illini researchers develop an age-guessing software which can perform tasks such as security control and surveillance monitoring, and may also be used for electronic customer relationship management
-
-
Colorado to remove Social Security numbers from public Web sites
Colorado attorney general asks counties to remove documents containing Social Security numbers from public Web sites, saying that the “The availability of this information online increases the possibility of Colorado citizens becoming the victims of identity theft”
-
-
CaTS, PerSay collaborate on voice recognition
South African, Israeli companies collaborate on offering voice recognition security solution for e-commerce applications
-
-
Snafu at biometric show
A London biometric show offered visitors the chance to view their biometrics data, and see it expressed as as a unique pretty flower diagram; trouble is, a glitch caused the biometric data of dozens of individuals to be e-mailed in a Thank You note to visitors to the show
-
-
Taiwan nabs major hacking ring
Criminal ring steals personal data of more than 50 million individuals — including Taiwan’s current and former presidents, and the current Taiwanese chief of police
-
-
Judge imposes gag order on Boston subway hackers
Three MIT students hacked smartcards used by the Boston subway system; they were planning to make a presentation about the hacking at this weekend Defcon event in Las Vegas — but a U.S. district judge imposed a gag rule on them
-
-
Calls for tougher debit card regulation
On Tuesday the Justice Department announced the indictment of eleven people for stealing and selling more than 40 million credit card and debit card numbers; watchgroups say this is evidence, if one were needed, that federal laws governing debit cards should be tougher — and more uniform
-
-
Security flaws in online banking sites widespread
Researchers find widespread security flaws in online banking Web sites; these design flaws are not bugs that can be fixed with a patch; rather, they stem from the flow and the layout of these Web sites
-
-
Draft security publication looks at cell phones, PDAs
PDAs are offering more and more features, and more people now use them; NIST publishes a draft guidelines on security considerations for cell phones and PDAs
-
-
Biometrics for U.K. home bankers
Digital DNA fingerprinting technology launched to improve IT security and reduce ID theft and fraud for the U.K. banking industry
-
-
Banks' PIN codes susceptible to hackers' theft
Network of PIN codes’ thieves nets millions of dollars; hackers are targeting the ATM system’s infrastructure, which is increasingly built on Microsoft’s Windows operating system and allows machines to be remotely diagnosed and repaired over the Internet
-
-
VCG offers back-office voice biometrics
New voice activated payments are in the pipeline; voice recognition will be used for both front-end and back-room applications
-