Outside of not using them, we can do only so much to secure our credit card numbers.
We all can use the best security software, two-factor authentication, but sometimes the bad guys still get the goods.
Recently, security researcher Brian Krebs wrote about a scheme using hardware keyloggers uncovered at a Florida Nordstrom department store.
Hardware keyloggers have been around for a long time and work similar to software keyloggers in capturing data, but they don’t rely on the operating system to work. They are often disguised to resemble a familiar looking connector or dongle to go unnoticed.
One of the largest threats facing users today is from Phishing attacks, or social engineering attempts at getting the average person to click on a malicious link.
The most common form of phishing comes from email however, another form can come from sources like social media, such as Facebook or Google+, services that typically have anti-spam, phishing and exploit features.
Though with every successful integration of anti-spam, anti-phishing and anti-exploit functionality, the bad guys go right back to the drawing table to find a new way to make your life miserable.
Looks like Adobe, makers of products as Photoshop and Adobe Reader, has suffered a major compromise. Brian Krebs, of Krebs On Security and Alex Holden, CISO of Hold Security LLC, discovered the breach earlier this week by
In a joint research effort they have found a trove of files, including uncompiled source code for Adobe products on a server known to be used by cyber criminals.
You can read the complete post from Brian here.
He has confirmed that Adobe is presently investigating a network compromise, and despite believing no customer credit card information exited their networks, they will be notifying potentially affected customers to change passwords.
Software are complex, having so many layers and hands involved in its creation. The bigger it becomes the more likely it is to have bugs and some potentially ugly ones at that.
No matter how much money, people or fans you throw at a software project, bugs will always creep up. Developers just hope to shake out as many as possible before release.
Apple released iOS 7 with the launch of new iPhones came with the usual excitement and fanfare. iOS 7 comes with new security features and lots of updates.
Heralded for their security enhancements and features, Apple was quick to send out fixes for the reportedly 80 security holes patch in iOS 7, including passcode holes and kernel fixes.
With the news of features and fixes it’s easy for us to feel secure and let our guard down when using an iDevice.
Well, not so fast.
It appears Apple is having its share of new security bugs.
Some time ago, I experimented with SignWave Unlock Free for Windows by Battelle.
This was software for my Leap controller that promised to use the shape of my hand as a biometric mechanism to unlock my workstation.
This app was only available for Windows and was a general disappointment.
My co-worker was able to unlock my workstation “handily” in about 30 seconds flat. We reproduced this failure several times, just to be sure. You can watch us do the “hack” here.
These hands are different, yet both unlocked my Windows workstation with the SignWave app.
I recently saw an application being advertised via the Leap motion newsletter that interested me, and when I plugged mine in and fired up their airspace market place, I was delighted to see that Battelle had released the Mac version of SignWave Unlock Free.
As originally promised, I decided to evaluate it.