Vulnerability Affects Over 2 Billion Devices

IMG_20140805_115213_edit_edit

Two research consultants with Accuvant Labs have recently discovered a security vulnerability that affects over 2 BILLIONphones! The vulnerability, which they will officially present later this week at the Black Hat security conference, involves an open-source device management tool, which used by many many vendors and carriers for OTA updates, remote device wipes, and more. This is something important, because mobile phones, devices are becoming part and parcel of our daily lives, even more so in the enterprise world with BYOD (Bring Your Own Device). Continue reading

Advertisements

Is Your Data Dafe From Prying Eyes After A Factory Wipe?

Samsung Note 3 Factory Reset

Phones now form an integral part of our lives, and most of us will swap devices every no and then, we will swap devices. However, is our usual factory reset sufficient in ensuring our data is safe from prying eyes? Well, in the case of android, the answer is no. Continue reading

Old Shared Links Disabled On Dropbox

Earlier last month, Dropbox has disabled access to previously created shared links to certain kinds of documents. This occured after there was a discovery of some user’s sensitive documents, including bank records, being exposed and found on Google AdWords. Apparently, Box is also affected by this. Continue reading

So What Is Next, After Snowden?

Edward Snowden

The world is constantly changing and there is definitely no doubt about it. However, there are times where change is rapid and there are times where change is slow; Last year in particular, was a really rapid one for both the security and technological front. Whatever this guy has done, is done considering that he has been on it for almost a full year running now. Continue reading

World Password Day – Is Your Password Safe?

Graphic-Password-Day-2014-Caption

Exactly one week ago, the world commemorated the annual World Password Day. Well, passwords these days are the only thing between a hacker or intruder to our beloved data. In lieu of the recent saga of the heart-bleed bug, it is perhaps the right time to look at this again. Continue reading