What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
grahamcluley.webp 2022-11-30 16:28:30 Twitter isn\'t going to stop people posting COVID-19 misinformation anymore (lien direct) As of September 2022, Twitter had challenged 11.72 million accounts, suspended 11,230 accounts, and removed over 97,674 pieces of misleading content related to COVID-19 worldwide. Today? It’s not doing anything. As an update on the company’s COVID-19 misinformation report webpage notes: Effective November 23, 2022, Twitter is no longer enforcing the COVID-19 misleading information policy. … Continue reading "Twitter isn’t going to stop people posting COVID-19 misinformation anymore" Guideline ★★★★
grahamcluley.webp 2021-10-04 12:27:42 The Pandora Papers is the Panama Papers turned up to 11 (lien direct) It's bad news for billionaires, world leaders, politicians, celebrities, fraudsters and royal family members who wanted to keep their tax-dodging activities secret. Guideline
grahamcluley.webp 2021-09-29 11:41:36 US cryptocurrency expert pleads guilty to helping North Korea evade sanctions (lien direct) A US cryptocurrency expert has pleaded guilty to conspiring to assist North Korea in evading sanctions, and could now face years in prison. Read more in my article on the Hot for Security blog. Guideline
grahamcluley.webp 2021-08-25 20:26:58 Man admits impersonating Apple support staff to steal 620,000 photos from iCloud accounts (lien direct) A 40-year-old man has agreed to plead guilty to US court charges that he broke into thousands of Apple iCloud accounts and stole hundreds of thousands of images and videos of young women. Read more in my article on the Hot for Security blog. Guideline
grahamcluley.webp 2021-08-16 12:35:15 Indra hacking group blamed for attack on Iranian railway system that trolled country\'s supreme leader (lien direct) On 9 July, Iran's railroad system came under attack from hackers. The attackers posted messages on station departure boards warning of "long delay[s] because of cyberattack", and suggesting inconvenienced passengers call "64411" for more information, the telephone number of Iran's supreme leader. And that's when things got really serious... Guideline
grahamcluley.webp 2021-07-22 00:06:39 Smashing Security podcast #237: NuNa, NuNu, NaNa (lien direct) Spy software known as Pegasus has been used to carry out surveillance on the smartphones of journalists, activists, and political leaders. Can a “Freedom Phone” be trusted? And a ransomware-hit law firm demonstrates how not to keep its customers informed. All this and much more is discussed in the latest edition of the award-winning “Smashing … Continue reading "Smashing Security podcast #237: NuNa, NuNu, NaNa" Guideline
grahamcluley.webp 2021-07-15 14:23:22 US offers $10 million reward in hunt for state-sponsored ransomware attackers (lien direct) The United States Department of State is offering a reward of up to $10 million for information leading to the identification of anyone, working for a foreign government, who participates in a cybercriminal attack against American critical infrastructure. Read more in my article on the Tripwire State of Security blog. Ransomware Guideline
grahamcluley.webp 2021-05-14 14:54:38 Gamers warned of downloading fake Afterburner overclocking tool to boost graphics card performance (lien direct) A leading manufacturer of gaming hardware has warned internet users to be wary of downloading fake versions of free software it distributes to overclock GPUs. Read more in my article on the Hot for Security blog. Tool Guideline
grahamcluley.webp 2021-03-28 14:15:13 Alex Salmond\'s Alba party website leaks data in IDOR foul-up (lien direct) It's just two days since former SNP leader Alex Salmond launched a brand new political party to campaign for an independent Scotland. And already it has suffered a data breach. Guideline
grahamcluley.webp 2021-03-18 12:20:03 Smashing Security podcast #219: Cheerleaders, dating apps, and crisis PR (lien direct) How are cheerleaders being creeped out by deepfakes? What might Tinder tell potential dates about your murky past? And how should companies respond to the press when a security breach occurs? All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Yvonne Eskenzi. Guideline
grahamcluley.webp 2020-12-07 18:14:33 Recruitment giant Randstad hit by ransomware, sensitive data stolen (lien direct) One of the world’s leading recruitment agencies has found itself the victim of ransomware. In a statement published on Thursday last week, Randstad said that it had “recently become aware of malicious activity” on its network. That “malicious activity” was the Egregor ransomware, and although Randstad says that its operations have not been compromised by … Continue reading "Recruitment giant Randstad hit by ransomware, sensitive data stolen" Guideline
grahamcluley.webp 2020-09-08 11:34:28 Mystery surrounds alleged Paytm Mall hack, as security firm hit by legal threat (lien direct) According to media reports, India's leading online shopping app has sent a legal notice to a US security firm demanding that they stop spreading “false” claims that it has been hacked. Indian financial newspaper Mint says that Paytm Mall has sent the legal notice to Atlanta-based Cyble Inc, which at the end of last month … Continue reading "Mystery surrounds alleged Paytm Mall hack, as security firm hit by legal threat" Threat Guideline
grahamcluley.webp 2020-09-03 09:44:58 Hackers hijack Indian PM Narendra Modi Twitter account (lien direct) The hackers used the platform to deny that they had hacked Paytm Mall, India's leading online shopping app. Read more in my article on the Hot for Security blog. Guideline
grahamcluley.webp 2020-06-04 14:09:13 The scammer who tried to launder over $500,000 through Business Email Compromise (lien direct) A 64-year-old man has pleaded guilty in a Texan court to charges of money laundering after a series of attacks that defrauded companies, including Electrolux, out of hundreds of thousands of dollars. Read more in my article on the Tripwire State of Security blog. Guideline
grahamcluley.webp 2019-11-19 16:24:05 Bad boy of Brexit Arron Banks hacked, private Twitter messages leaked (lien direct) British businessman Arron Banks, one of the self-styled “Bad Boys of Brexit” and a leading figure of the Leave.EU campaign, has had his Twitter account hacked. Guideline
grahamcluley.webp 2019-10-31 22:20:11 (Déjà vu) Men who were paid $100,000 by Uber to hush-up hack plead guilty to extortion scheme (lien direct) Two hackers face up to five years in prison after pleading guilty to their involvement in a scheme which saw them attempt to extort money from Uber and LinkedIn in exchange for the deletion of stolen data. Read more in my article on the Tripwire State of Security blog. Hack Guideline Uber
grahamcluley.webp 2019-08-30 09:00:02 The top reason businesses make a cyber insurance claim – Business Email Compromise (lien direct) AIG, one of the largest insurance companies in the world, has issued a report which reveals that there is a new leader in the list of top threats causing losses for businesses. Read more in my article on the Bitdefender Business Insights blog. Guideline
grahamcluley.webp 2019-08-19 14:20:03 20 month prison sentence for British hacker who made fortune helping SIM-swap fraudsters (lien direct) A teenage British hacker, who previously played a role in the infamous TalkTalk data breach, has been sentenced to 20 months in prison after pleading guilty to selling hacking services and stolen personal data for cryptocurrency. Read more in my article on the Hot for Security blog. Guideline
grahamcluley.webp 2019-04-25 10:43:01 Smashing Security #125: Pick of the thief! (lien direct) WannaCry’s “accidental hero” pleads guilty to malware charges, Samsung and Nokia have fingerprint fumbles, the NCSC publishes a list of 100,000 dreadful passwords, and Apple finds itself at the centre of an identity mix-up. All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by John Hawes. Malware Guideline Wannacry
grahamcluley.webp 2019-04-07 22:50:03 How CISOs should respond to the cybersecurity crisis (lien direct) How CISOs should respond to the cybersecurity crisisGraham Cluley Security News is sponsored this week by the folks at CloudShare. Thanks to the great team there for their support! As cyber hacks, ransomware, and other breaches continue to rise, companies are quickly realizing the need for increasing their cybersecurity staff. Current data however indicates that the cybersecurity manpower shortage continues to grow, with over 1,000,000 cybersecurity positions unfilled in the U.S. alone. The relationship between this shortage of cyber security skills and hacking exposure can't be ignored, with many companies feeling that their lack of employees with cybersecurity skills make for more desirable targets for cyber criminals. It's imperative therefore that these employees are sufficiently trained to receive the promised benefits from products and solutions, and able to sell and support them as well. The challenges facing the cyber industry today can be overcome in a variety of ways such as: Replicating complicated products with complex networking features. Running complex training scenarios (for example, injecting scripts). Providing templates of complex related structures. Offering timed environments. Creating replication of complex environments in seconds. Securing the enterprise is a people problem that needs immediate attention! Download the free eBook “Under Attack!”, and get a comprehensive examination of the skill-building strategies needed to strengthen lines of defense across the organization including: An examination of today's urgent cybersecurity skills crisis The top ten actions organizations can take to become more cyber resilient Insights into the most effective cybersecurity training options Tips for creating a corporate cybersecurity culture “People impact security outcomes much more than any technology, policy or process.” Joanna G. Huisman, Analyst at Gartner Since 2007, CloudShare has been the leading supplier of virtual IT labs in the cloud, with specialized solutions designed to meet a wide variety of business needs – including training, sales enablement, and sandboxing for testing and support. CloudShare customers include leading software and cybersecurity companies, such as Palo Alto Networks, Atlassian, ForgeRock, Sophos, Fortinet and Check Point Software Technologies.
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
Guideline
grahamcluley.webp 2019-03-21 13:30:00 Google and Facebook scammed out of $123 million by man posing as hardware vendor (lien direct) Google and Facebook scammed out of $123 million by man posing as hardware vendorEven the most tech savvy companies in the world can fall for business email compromise. A Lithuanian man has this week pleaded guilty to tricking Google and Facebook into transferring over $100 million into a bank account under his control after posing as a company that provided the internet giants with hardware for their data centers. Read more in my article on the Tripwire State of Security blog. Guideline
grahamcluley.webp 2019-02-25 15:42:01 Russian creator of NeverQuest banking trojan pleads guilty in American court (lien direct) Russian creator of NeverQuest banking trojan pleads guilty in American courtArrested as he returned his rental car at Barcelona's airport, a 33-year-old Russian faces up to five years in jail after admitting to being the mastermind behind the sophisticated NeverQuest banking trojan. Read more in my article on the Hot for Security blog. Guideline
grahamcluley.webp 2019-02-19 11:07:03 (Déjà vu) Why real-time intelligence matters for managing third-party risk (lien direct) Why real-time intelligence matters for managing third-party riskGraham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! As leading companies in every industry today are undergoing digital transformation, the lines are blurring between any one organization and its partners, suppliers, vendors, and other third parties. In this new report, ESG examines how these business relationships can introduce new risks that need to be identified and managed “as if these third parties were part of the enterprise itself.” Download your copy now of “Third-Party Risk: Why Real-Time Intelligence Matters” About Recorded Future Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to alerts 10 times faster. To supercharge the efforts of security teams, our technology automatically collects and analyzes intelligence from technical, open web, and dark web sources and aggregates customer-proprietary data. Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis, collaboration, and integration with security technologies. 91 percent of the Fortune 100 use Recorded Future.
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
Threat Guideline
grahamcluley.webp 2018-10-25 08:32:01 Smashing Security #101: Rule 34, Twitter scams, and Facebook fails (lien direct) Smashing Security #101: Rule 34, Twitter scams, and Facebook failsA Facebook friend request leads to arrest, Twitter scams ride again via promoted ads, and adult websites expose their members. Oh, and Graham finds out what Rule 34 is. All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis. Guideline
grahamcluley.webp 2018-10-17 21:59:01 Naked celebrity photo hacker was former high school teacher (lien direct) Former teacher admits hacking into celebrity accounts to steal naked photosA former high school teacher is to plead guilty to hacking into the online accounts of celebrities and stealing naked photographs and other private information. Guideline
grahamcluley.webp 2018-09-10 09:17:02 Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics. Download free ebook sneak peek today (lien direct) Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics. Download free ebook sneak peek todayGraham Cluley Security News is sponsored this week by the folks at Nehemiah Security. Thanks to the great team there for their support! Coming this fall, Nehemiah is releasing their newest ebook, “Cyber as a Business Enabler: Operationalizing Cyber Risk Analytics”. This introductory guide arms the modern day cybersecurity leader to put cyber risk into motion and transform cybersecurity operations into a business enabler. Topics covered in this book include: The end goal of cyber risk analytics Where to gather the right data Key stakeholders involved What it takes to quantify cyber risks financially Follow this link for a sneak peek into the content and to reserve your copy when the full book is released!
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
Guideline
grahamcluley.webp 2018-08-17 11:21:04 Apple hacked by 16-year-old who “dreamed” of working for firm (lien direct) Apple hacked by 16-year-old who An Australian teenager has admitted hacking into Apple's internal network and stealing 90 GB worth of files. The 16-year-old has pleaded guilty to breaking into Apple's systems on multiple occasions over the course of a year, from his parent's home in Melbourne's suburbs. Read more in my article on the Hot for Security blog. Guideline ★★★
grahamcluley.webp 2018-07-09 15:26:00 Poor security at Thomas Cook airlines leads to simple extraction of fliers\' personal data (lien direct) Poor security at Thomas Cook airlines leads to simple extraction of fliers' personal dataThousands of holidaymakers relying upon Thomas Cook Airlines to get them to their vacation may have had their personal information put at risk due to sloppy security. Guideline
grahamcluley.webp 2018-06-27 13:47:05 Reality Winner pleads guilty after being unmasked by microdots (lien direct) Reality Winner jailedReality Winner, the US government contractor who leaked top secret documents about Russian hacking, has pleaded guilty. Guideline
grahamcluley.webp 2018-05-24 07:46:03 Smashing Security #079: Mugshots, mobile mania, and back end gurus (lien direct) Smashing Security #079: Mugshots, mobile mania, and back end gurusA website which demands money if you want your mugshot removed, could “sharenting” lead to a rise in fraud and identity theft, and how could the FBI have overcounted encrypted phones so badly? All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest Maria Varmazis. Guideline
grahamcluley.webp 2018-04-12 09:38:05 Kemi Badenoch MP, self-confessed website hacker (lien direct) Kemi Badenoch MP, self-confessed website hackerIn 2008, the deputy leader of the British Labour party had her website hacked. And now we know who did it… Guideline
grahamcluley.webp 2018-03-22 17:32:04 Did hackers lead warplanes to Syrian hospital after targeting British surgeon\'s computer? (lien direct) Did hackers lead warplanes to Syrian hospital after targeting British surgeon's computer?BBC Newsnight broadcast phone number of surgeons working in war-torn Aleppo… and then the hospital was bombed. Guideline
grahamcluley.webp 2018-03-13 08:40:03 Know who hacked the Binance cryptocurrency exchange? Earn $250,000 (lien direct) Know who hacked the Binance cryptocurrency exchange? Earn $250,000Binance, one of the world's biggest cryptocurrency exchanges by trading volume, has offered a reward equivalent to $250,000 to anyone providing information that leads to the arrest of hackers who attacked the platform last week. Read more in my article on the Hot for Security blog. Data Breach Guideline
grahamcluley.webp 2018-03-12 13:56:03 Join SC Media for their 12th annual cybersecurity conference, RiskSec, in New York! (lien direct) Join SC Media for their 12th annual cybersecurity conference, RiskSec, in New York!Graham Cluley Security News is sponsored this week by the folks at SC Media. Thanks to the great team there for their support! SC Media's 12th annual security conference, RiskSec (previously branded as SC Congress) will be held May 31 in New York City. This event will provide insights from thought leaders across various industries, focusing on the most significant issues that CISOs and other security professionals face every day. Features include: Interactive learning sessions Demos from 25 prominent tech companies 30+ industry-leading speakers Ability to earn up to 9 CPE credits Breakfast and lunch from executive chef Cocktail reception In 2017, there was a record number of massive data breaches that compromised millions of users' data and cost senior-level executives their jobs. This event is a great opportunity to collaborate and continue to improve defense techniques. Use discount code CLULEY for $100 off admission. RiskSec is a selective event for senior security professionals. Space is limited and the event will sell out.
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
General Information Guideline ★★
grahamcluley.webp 2018-01-18 09:25:10 Smashing Security #061: Fallout over Hawaii missile false alarm (lien direct) Smashing Security #061: Fallout over Hawaii missile false alarmUser interfaces and poor procedures lead to pandemonium in Hawaii, hackers are attempting to trick victims into opening cryptocurrency-related email attachments, and yet more pox-ridden apps are found in Android's Google Play store. Guideline
grahamcluley.webp 2017-12-15 13:57:05 Business Email Compromise scammer sentenced to 41 months in prison (lien direct) Business Email Compromise scammer sentenced to 41 months in prisonA US judge has sentenced a Nigerian man to three years and five months in a federal prison after he pleaded guilty to taking part in a business email compromise scam that targeted organisations around the world. Guideline
grahamcluley.webp 2017-11-09 08:41:18 Smashing Security podcast #051: Robots, romance, passwords, and CrunchyRoll (lien direct) Smashing Security podcast #051: Robots, romance, passwords, and CrunchyRollPasswords are under the microscope again, CrunchyRoll leads anime fans to malware, a sexy robot gains Saudi citizenship, and Carole begins her career as an agony aunt. Guideline
grahamcluley.webp 2017-10-24 14:31:02 87% of banks don\'t identify fraud in real time. Download the \'2017 Faces of Fraud Survey\' report now! (lien direct) 87% of banks don't identify fraud in real time. Download the '2017 Faces of Fraud Survey' report now!Graham Cluley Security News is sponsored this week by the folks at VASCO. Thanks to the great team there for their support! The 2017 Faces of Fraud Survey, conducted by iSMG, the world's largest media organization devoted solely to information security and risk management, delivers revealing insights into the sector's challenges in fraud practices and strategies, and underscores the growing vulnerability of mobile channels. The 2017 Faces of Fraud Survey was commissioned by VASCO and compiled with responses from banking and security leaders representing financial institutions ranging from under $500 million to more than $20 billion in assets. Key findings include: 52 percent say today's fraud schemes are too sophisticated and evolve too quickly to keep pace Only 38 percent have high confidence in their organization's ability to detect and prevent fraud Almost half identify technical barriers or controls not talking to one another as a top challenge to improving enterprise fraud 41 percent do not want to add new anti-fraud controls that might negatively impact the customer experience 35 percent say they are countering mobile exploits with multifactor authentication Just 13 percent believe they are identifying fraud in real time Download the 2017 Faces of Fraud Survey, a 27-page report that documents how leaders in the banking and security industries are preparing for fraud. Roughly 250 banking/security leaders participated in this survey, which was conducted to determine: The top forms of fraud afflicting financial organizations in 2017 The biggest gaps in organizations' efforts to detect and prevent fraud What organizations are doing to counter the surge in mobile exploits Get your copy of the full report now.
Guideline
grahamcluley.webp 2017-09-19 11:33:58 Misleading headlines about Equifax\'s *earlier* hack (lien direct) Misleading headlines about Equifax's *earlier* hack Guideline Equifax
grahamcluley.webp 2017-08-17 08:42:28 Smashing Security #038: Gents! Stop airdropping your pics! (lien direct) Smashing Security #038: Gents! Stop airdropping your pics!WannaCry hero Marcus Hutchins (aka MalwareTech) pleads not guilty to malware charges, the Scottish parliament is hit by a brute force attack, IoT smart locks aren't so smart, and.. ahem.. someone is sending intimate pics via AirDrop to unsuspecting commuters. All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by technology journalist Geoff White. Guideline Wannacry
grahamcluley.webp 2017-08-15 08:12:30 MalwareTech is back online, as he pleads not guilty to Kronos malware charges (lien direct) MalwareTech is back online, as he pleads not guilty to Kronos malware chargesBritish security researcher Marcus Hutchins pleads not guilty to malware charges in a US court, and returns to Twitter. Guideline
grahamcluley.webp 2017-07-20 01:48:15 Publication of NukeBot trojan\'s source code leads to new \'operational\' samples (lien direct) Publication of NukeBot trojan's source code leads to new 'operational' samplesNew "operational" samples of the NukeBot banking trojan have emerged months after its original creator published its source code. David Bisson reports. Guideline
grahamcluley.webp 2017-06-23 23:59:43 800,000 Virgin Media customer urged to change their router passwords (lien direct) 800,000 Virgin Media customer urged to change their router passwordsVirgin Media, a leading provider of internet, TV, and phone services in Britain, is urging customers to reset the passwords on their routers. Read more in my article on the Bitdefender BOX blog. Guideline
grahamcluley.webp 2017-06-07 20:24:29 Annoying Android app demands admin rights to display ads (lien direct) Annoying Android app demands admin rights to display adsAn annoying Android app asks a user to grant it administrator rights in order to display ads that lead to potential drive-by downloads. David Bisson reports. Guideline
grahamcluley.webp 2017-03-22 10:40:36 Victims\' real details helping hackers trick victims into installing banking malware (lien direct) Victims' real details helping hackers trick victims into installing banking malwareRemember to always be wary of opening unsolicited email attachments and clicking on unknown links. Clicking before you think could lead to your downfall. David Bisson reports. Guideline
grahamcluley.webp 2017-02-03 13:54:38 Critical Cisco security hole could lead to hackers seizing control of thousands of home routers (lien direct) Critical Cisco security hole could lead to hackers seizing control of thousands of home routersIf you are a company running Cisco Prime Home to control your customers' devices – update it now. Read more in my article on the Bitdefender Box blog. Guideline
grahamcluley.webp 2016-12-14 12:58:09 TalkTalk\'s hacker (and blackmailer) pleads guilty (lien direct) Talktalk thumbKids - don't hack into companies without their permission. They don't like it, and neither do the cops. Guideline
grahamcluley.webp 2016-10-28 08:56:22 Researchers exploit unencrypted radio to hack wireless mice, keyboards (lien direct) Researchers exploit unencrypted radio to hack wireless mice, keyboardsResearchers have demonstrated that an attacker can hack unencrypted radio communication to seize control of many leading wireless keyboards and mice. David Bisson reports. Guideline
grahamcluley.webp 2016-10-03 09:14:26 (Déjà vu) Discover VASCO\'s top 10 tips for a successful and secure Mobile First Strategy (lien direct) Discover VASCO's top 10 tips for a successful and secure Mobile First Strategy! Register now for this webinarGraham Cluley Security News is sponsored this week by the folks at VASCO. Thanks to the great team there for their support! VASCO, a global leader in authentication, electronic signatures, and identity management, is sharing its expertise in a free on-demand webinar entitled "Top 10 tips for a successful and secure mobile first strategy." Mobile banking has definitely shifted focus from transaction to customer interaction, enabling users to engage with their bank anytime, anywhere and more frequently. But how can you establish a successful and secure mobile first strategy, while keeping an eye on user convenience? Check out this FREE on-demand webinar now! Discover the necessary tips to establish a successful and secure mobile first strategy: Enable more services on mobile Make user experience fast, convenient and secure Score your user's device and context Combat malware and other attacks Adopt mobile as the key to all your banking channels and many more...
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
Guideline
grahamcluley.webp 2016-09-12 09:05:53 Discover VASCO\'s top 10 tips for a successful and secure Mobile First Strategy! Register now for this webinar (lien direct) Discover VASCO's top 10 tips for a successful and secure Mobile First Strategy! Register now for this webinarGraham Cluley Security News is sponsored this week by the folks at VASCO. Thanks to the great team there for their support! VASCO, a global leader in authentication, electronic signatures, and identity management, is sharing its expertise in a free webinar entitled "Top 10 tips for a successful and secure mobile first strategy." Mobile banking has definitely shifted focus from transaction to customer interaction, enabling users to engage with their bank anytime, anywhere and more frequently. But how can you establish a successful and secure mobile first strategy, while keeping an eye on user convenience? Register today for this FREE 30-min webinar! Discover the necessary tips to establish a successful and secure mobile first strategy: Enable more services on mobile Make user experience fast, convenient and secure Score your user's device and context Combat malware and other attacks Adopt mobile as the key to all your banking channels and many more...
If you're interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.
Guideline
Last update at: 2024-04-28 17:08:01
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter