security protocol

security protocol

Twitter Adds DMARC Email Authentication To Curb Login-Jacking Attempts Via Impostor Messages

techcrunch.com
Twitter announced via its blog today that it has begun using DMARC, a security protocol designed to cut down the number of fake emails that users receive from companies pretending to be Twitter itself. The move should help cut down on phishing scams, where third parties try to get users...
Twitter Adds DMARC Email Authentication To Curb Login-Jacking Attempts Via Impostor Messages

Introducing DMARC for Twitter.com emails

blog.twitter.com
We send out lots of emails every day to our users letting them know what’s happening on Twitter. But there’s no shortage of bad actors sending emails that appear to come from a Twitter.com address in order to trick you into giving away key details about your Twitter account, or...
Introducing DMARC for Twitter.com emails
BYOD is unstoppable. Smart companies must build apps

Security protocol HSTS wins proposed standard status

news.cnet.com
Web sites complying with the policy will automatically prompt browsers accessing it to always interact with it over a secure connection. [Read more]...
Security protocol HSTS wins proposed standard status

The problem with BYOD: We all suck at mobile security

venturebeat.com
The bring-your-own-device (BYOD) movement may be a dream come true for office workers, but there’s one big problem: Office workers are really bad at securing their phones. That’s the message embedded in a survey by IT risk and compliance services company Coalfire, which talked to 400 non-IT workers to get...
The problem with BYOD: We all suck at mobile security

Iran reportedly blocking encrypted Internet traffic

arstechnica.com
The Iranian government is reportedly blocking access to websites that use the HTTPS security protocol, and preventing the use of software residents use to bypass the state-run firewall. From  post on Hacker News today, apparently written by an Iranian resident:  Since Thursday Iranian government has shutted [sic] down the https...
Iran reportedly blocking encrypted Internet traffic
Windows 8 SmartScreen leaves user data exposed, says researcher

LinkedIn’s iOS app collects and sends names, emails and meeting notes from your calendar back, in plain text

thenextweb.com
The LinkedIn mobile app for iOS devices collects full meeting notes and details from your device’s calendar and sends them back to the company, The Next Web has been informed. The information is gathered without explicit permission by a feature that allows users to access their calendar within the app. This raises...
LinkedIn’s iOS app collects and sends names, emails and meeting notes from your calendar back, in plain text
Google's new security protocol sounds great, but let's ditch the rings

Twitter implements DMARC standard to fight phishing

www.pcworld.com
Twitter has implemented DMARC, a standard for preventing email spoofing, in order to make it harder for attackers to send phishing emails that appear to come from twitter.com addresses. Twitter users are constantly targeted in phishing attacks that try to pass rogue emails as official communications from the company....
Twitter implements DMARC standard to fight phishing

Already awash in cloud cash, Virtustream raises $15M more

gigaom.com
Cloud computing provider Virtustream — a hot player in the enterprise cloud space — has raised another $15 million in investment capital. The money came from existing investors Intel Capital, Columbia Capital, Noro-Moseley Partners and TDF, as well as new investor QuestMark Capital.This round brings Virtustream’s total funding to $75 million....
Already awash in cloud cash, Virtustream raises $15M more
Up to 1.5 million credit card numbers 'exported' in Global Payments hack

Introducing OAuth 2.0

hueniverse.com
Two weeks ago, the IETF OAuth Working Group published the first draft of the OAuth 2.0 protocol. OAuth is a security protocol that enables users to grant third-party access to their web resources without sharing their passwords. OAuth 1.0 was published in December 2007 and quickly become the industry standard...
Introducing OAuth 2.0

White House 'Insider Threat' program reportedly equates whistleblowing with spying

www.theverge.com
The Obama administration has taken a hard line on secrecy and internal security, aggressively prosecuting leakers and using surveillance programs to uncover journalists' anonymous sources. And according to the McClatchy news agency, a program aimed at preventing leaks could be discouraging whistleblowing by equating it with treason. McClatchy has...
White House 'Insider Threat' program reportedly equates whistleblowing with spying

Security startup Nok Nok Labs wants to rid the world of passwords

gigaom.com
Startup Nok Nok Labs has developed a security protocol that asks end users to substitute stronger authentication tools such as fingerprints and voice recognition for the usual user names and passwords. Named after the classic knock-knock joke, Nok Nok Labs wants to revolutionize online identity authentication with tools that already...
Security startup Nok Nok Labs wants to rid the world of passwords
× Just a test of the new info bar. What do you think?