Author: Paul

Online Security Protection Internet Safety Office Desk Concept

Podcast: Passwords are dying, but they’re not going anywhere

In-brief: Companies like Microsoft and Google have both unveiled initiatives that de-emphasize the traditional, static, alpha-numeric password in recent days. So is the password going the way of the horse and buggy? Don’t be so sure, says Robert Capps of the firm NuData. Capps thinks that passwords will be with us for the foreseeable future and that companies concerned about security need to do more than just find a more secure way to log-in. 

IOActive researchers extracted firmware from the Linksys smart wifi router and discovered 10 security vulnerabilities. (Photo courtesy of IOActive.)

Bot Fodder: 20 Models of Linksys Routers Vulnerable to remote Hacks

In-brief: serious security flaws affect 20 models of wireless routers manufactured by the firm Linksys, just the latest report to underscore security flaws in ubiquitous networking hardware that is used by homes and small businesses, the firm IOActive disclosed on Thursday.

Microsoft's Skype was the platform of choice for cyber criminal communications, even though more secure alternatives exist, a study by Flashpoint concludes.

When Cybercrooks Chat, Privacy isn’t Everything

In-brief: a survey of cyber criminal groups by Flashpoint revealed that secure messaging apps are becoming more popular, but that security isn’t the only thing motivating online criminals. 

Program code on a monitor

Code Tutorials Spread Application Flaws Far and Wide

In-brief: Researchers at universities in Germany, working with the security firm Trend Micro, discovered more than 100 vulnerabilities in GitHub code repositories simply by looking for re-used code from tutorials and other free code samples. The same method could be harnessed by cyber criminals or other sophisticated attackers to find and exploit vulnerabilities in software applications, the researchers warned.