FIDO Alliance Members Introduce FIDO Authentication to Mobile World Congress 2014 | FIDO Alliance

On October 22, 2014, in Identity Security, by transxf1

“At Mobile World Congress, FIDO Alliance members will engage the global mobile community in our important quest for universal strong authentication.  Like the Internet, the mobile industry is limited until strong authentication standards are ubiquitous. Trust is foundational to mobile markets – mobile users who can trust that the products and services they use are […]

60 Percent of Android Attacks Use Financial Malware

On October 21, 2014, in Security, by transxf1

In case you thought that your Android device was immune from malware or virus attack, consider this report from Kaspersky Lab: ” “During the past few years we have witnessed the rise of mobile cyber threats which have become more complex and intelligent enough to target specific entities. With the mobile market growing exponentially, it […]

Don’t Be That Guy Privacy Videos Available Now

On October 16, 2014, in Security, by transxf1

Trend Micro is one security product vendor I have evaluated, used, recommended, and deployed at client sites.  While this post is not a paid endorsement, I trust their judgment about the contents of videos designed to help companies and users make decisions about how to protect themselves on the Internet. Don’t Be That Guy who […]

The use and capability of consumer technology is far outpacing understanding of how it works

On October 13, 2014, in Opinions, technology, by transxf1

The title is a quote from a recent post from Network World, “Who’s to blame for Snapchat’s massive nude photo leak.”  (Apologies for not including the link here) But a reading of Network World’s coverage of the snafu demonstrates the importance of this post’s title, that the “Brave New World” of technology is probably upon […]

NSA snooping tactics will be copied by criminals in 3 to 5 years

On October 9, 2014, in Privacy, by transxf1

“If you thought NSA snooping was bad, you ain’t seen nothing yet: online criminals have also been watching and should soon be able to copy the agency’s invasive surveillance tactics, according to security guru Bruce Schneier. “The NSA techniques give about a three to five year lead on what cyber-criminals will do,” he told an […]

Shellshock: Healthcare Mitigation Steps

On October 1, 2014, in Privacy, by transxf1

“The concern now is that attackers may exploit a new, widespread vulnerability that healthcare institutions have yet to patch or mitigate. “While it’s still being determined if Shellshock is as damaging as Heartbleed, it’s certainly as serious,” says Brian Evans, senior managing consultant at IBM Security Services. So, healthcare organizations must mitigate the Shellshock vulnerability […]

ISO’s New Cloud Privacy Standard

On September 30, 2014, in Privacy, by transxf1

Great News! We have a new cloud privacy standard from ISO, the International Standards Organization.  Now lets get the word out.  The more who have a starting framework, the quicker we’ll have adoption, oversight, and enforcement of standards world wide. OK.  Its a start! “Always process personal information in accordance with the customer’s instructions. Only […]

Contactless Mobile Payments Rolled Out on London Underground

On September 16, 2014, in technology, by transxf1

Cash on Tap contactless mobile payments NFC – Near Field Communications Oyster Card Proxama proximity marketing specialists Names to look into as contactless (and credit cardless) payments roll out in Europe and come to one of 220,000 locations near you soon. Contactless Mobile Payments Rolled Out on London Underground | Mobile Marketing Magazine. Apple’s NFC […]

Data protection authorities find privacy lapses in majority of mobile apps | CSO Online

On September 12, 2014, in Privacy, by transxf1

“Many mobile apps request too many permissions and don’t explain how they collect users’ personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found. The majority of the apps reviewed did not adequately explain to users how they were collecting and using information, according to the study, carried out […]

RadioShack to deploy Trustev across all stores and online

On September 5, 2014, in Privacy, by transxf1

“This custom solution from Trustev uses “data fingerprinting” to verify a transaction’s validity. When a customer makes an in-store purchase, Trustev’s software instantly scans approximately 260 online data points to ensure the buyer is legitimate and confirm their identity. Additional enhancements through the Trustev platform include an integrated activation portal for credit authorization, as well […]