Archive for the ‘Mobile’ Category

Touchscreens ‘at risk from chip in the middle attack’, warn researchers

August 25th, 2017

Researchers call for manufacturers to recognize that compromised hardware is a real possibility

Posted in chip-in-the-middle attack, hardware threats, Mobile, supply chain | Comments (0)

Two-factor via your mobile phone – should you stop using it?

July 11th, 2017

Although SIM cards themselves are very secure, it’s annoyingly easy for a crook to get hold of one for your number

Posted in 2-factor Authentication, 2FA, data loss, Mobile, Security threats, sim swap, Vulnerability | Comments (0)

Two-factor via your mobile phone – should you stop using it?

July 11th, 2017

Although SIM cards themselves are very secure, it’s annoyingly easy for a crook to get hold of one for your number

Posted in 2-factor Authentication, 2FA, data loss, Mobile, Security threats, sim swap, Vulnerability | Comments (0)

The Trends & Challenges Facing The Internet Of Things

July 11th, 2017

The Internet of Things, or IoT, is now commonplace in society today. Since the term was first coined back in the 80’s, connected devices have changed our lives in ways many of us could only dream of. However, whilst the growth has been significant, integrating IoT devices into everyday life even further is not without its challenges. In this post, I’m going to look at some of the trends that will help take IoT integration even further, as well as some of the hurdles being faced.

Trends

Hands Free

Today, the most common way of interacting with IoT devices and electronics is primarily touch. However, the ability to use voice is shaking up how consumers and technology interact. Voice is making a significant impact on our everyday lives and it will continue to become more prominent as the technology evolves. Very recently, we’ve seen the introduction of Amazon’s Alexa and Google’s Home devices. With the likes of Siri, Cortana and Assistant already being used outside of smartphones and tablets, it will only be a matter of time before consumers are controlling their IoT devices by voice. It has even begun to make its way into cars, as we’ve seen with Nissan introducing Cortana to the dashboard interface. Using our hands could well become a thing of the past!

Big Data & Machine Learning

At the very core, big data and IoT need each other. Both are powerful trends that are reshaping the way consumers and businesses operate. However, the value of IoT for big tech firms isn’t just in the hardware, it also lies in the huge amounts of data the devices are producing. Data is becoming the ‘new oil’ and IoT devices increase the amount of data companies have on consumers, making them incredibly valuable. Companies will start to use Artificial Intelligence (AI) to analyse the huge pools of data allowing them to provide a much more tailored offering with devices eventually beginning to learn and adapt to how we use them. With AI integration, it gives companies the ability to analyse data and learn, with devices ultimately becoming automated — a fundamental shift in how consumers interact with their devices.

Challenges

Safety & Security

With more devices becoming connected and even more planned for the future, one of the biggest elements that needs to be addressed to make IoT a success is making sure devices are safe and secure. A recent report from Gartner predicted there will be 8.4 billion connected ‘things’ in 2017 and as many as 20 billion by 2020 — a huge amount of devices that if breached, could at the very least expose critical user data, but could also do much worse when we consider how connected hospitals and cities are becoming. If we take hospitals for example, an attack on the network could have huge ramifications on patients so as the reliability on technology increases, the security must mirror that. Looking at things much closer to home, implementing the right security platforms, like our Smart Home software will make sure cyber attacks on your connected devices in the home don’t happen.

Multiple Devices

As we’ve mentioned before, the exponential growth of IoT means more and more devices will be using a network, which will in turn place an incredible amount of strain on our networks. The result of an overburdened network could mean a drop in service, which is something most businesses and consumers would be keen to avoid. How many times has your internet connection dropped or your WiFi cut out for a few seconds? It’s not uncommon in the home today and the consequences are probably minimal, but imagine that happening for businesses — it could be catastrophic. Seamless integration is critical for the successful use of IoT.

To keep up-to-date with the latest cybersecurity news, take a look at the McAfee Security blog here.

The post The Trends & Challenges Facing The Internet Of Things appeared first on McAfee Blogs.

Posted in consumer, Internet of things, IoT, Mobile, smart home | Comments (0)

Amazon plans to check up on your price checks

June 19th, 2017

Thinking of shopping in one of Amazon’s new physical stores? Think twice about using their free Wi-Fi to do a price comparison while you’re there as a patent suggests they’ll be snooping on your browsing

Posted in amazon, comparison shopping, free Wi-Fi, Mobile, open Wi-Fi, public Wi-Fi, wi-fi | Comments (0)

How Using A VPN Could Save Your Summer

May 23rd, 2017

As summer inches closer, I begin to daydream about all the trips I’ll get to take with my family. However, whether our days are spent on the beach or walking around cities we’ve never explored, they all start the same: long-haul flights, airports, and hotels. While the Wi-Fi at the airport may claim to be secure in the network name, public Wi-Fi networks lack encryption, which scrambles the data being sent over the network. Without encryption, cybercriminals can intercept shared information and gain access to personal passwords, financials, or identity information.

Traveling often means I’ll be surrounded by (and connecting to) unfamiliar Wi-Fi networks, which makes it especially important to have a smart security solution in place for all my devices. I rely on two different tools to keep my devices and my family’s devices safe while we’re on the road. One is a personal VPN, which keeps my connections safe, even if I need to log into an insecure Wi-Fi network. Personal VPNs encrypt online activities in both public and secure Wi-Fi networks, allowing users to surf the web safely and feel at peace knowing that sensitive information will be kept private.

If you tend to spend a lot of browsing or doing work from your device while traveling, make sure to download security apps that protect your devices directly. It’s nice to have that extra layer of security, as these apps analyze the applications already installed on my phone that use my private information, and secure my data accordingly. If you’re traveling to cities where pickpocketing is common (or if you’re simply forgetful), many of the security apps also offer anti-theft protection that allow the user to back up, lock, and wipe the device remotely.

My family likes to travel to many different places in one vacation, which makes these apps perfect – since we’re bouncing between hotels or vacation rentals, we’re often surrounded by unknown networks. If your device has made an unknown connection, you’re potentially at risk of downloading fishy viruses or malware through the network. I’ve found that it’s always smart to have extra protection if your devices have a higher chance of making an insecure connection.

While these tools are important to have, we’ve learned that technology can occasionally fail us. One of the most trustworthy ways to keep your devices safe while jet-setting around this summer is to understand what an insecure Wi-Fi connection looks like. If you can determine whether the connections around you are safe or not, it will potentially save you and your loved ones a massive headache down the road. Look out for these warning signs of an insecure network, and stay away from connecting if the network looks suspicious.

  • Check the Authenticity. If there is no WPA or WP2 password for protected access, the connection is open, or unencrypted. You can check the authenticity of the network by going into internet settings and looking to see if it’s protected with a WPA or WPA2, or if it says it’s “open.”
  • HTTP vs. HTTPS? Make sure that the web pages you visit are “HTTPS” encrypted whenever possible. Do this by looking at the beginning of the URL you are accessing – if the URL starts with “HTTP”, log out – particularly if you’re doing something sensitive.
  • Pay Attention to the Warning Signs. SSL and TLS warnings are the messages that pop up in your browser when you’re in danger of connecting to an insecure connection – and it’s likely that you’ve clicked through the notification without a second thought. Take a moment to think about what you’re agreeing to before moving past the notifications next time, because it could mean you’re putting your devices in danger.
  • Be Picky. Don’t set your device to automatically connect to Wi-Fi networks. Rather, make sure your laptops, tablets, or smartphones will “forget” certain networks when you disconnect, and that they’ll only reconnect when you choose to do so manually.

From the “secure Wi-Fi” you find at the airport and airplane, to whatever you can connect to in your hotel or vacation rental, it’s smart to have a secure solution if you plan to stay connected while traveling.  Know the warning signs of an insecure Wi-Fi connection and use a personal VPN and/or mobile security solution whenever possible to keep your data as protected as possible. Have a secure summer, and happy travels!

Looking for more mobile security tips and trends? Be sure to follow @McAfee_Home on Twitter, and like us on Facebook.

The post How Using A VPN Could Save Your Summer appeared first on McAfee Blogs.

Posted in consumer, McAfee Mobile Security, Mobile, Mobile Security | Comments (0)

Judge demands cellphone passwords from social media star

May 22nd, 2017

Hencha Voigt and her partner Wesley Victor were unable to unlock their phones despite the judge’s order – and the case highlights some inconsistencies in the law

Posted in Celebrities, hencha voigt, Law & order, Mobile, Security threats | Comments (0)

Samsung Smart TV flaw leaves devices open to hackers

April 27th, 2017

Researchers warn that the TV’s lack of authentication means that a hacker could use it to access your Wi-Fi network

Posted in Law & order, Mobile, Neseso, Samsung, Samsung TV, Security threats, Smart TV, Vulnerability, Wi-Fi Direct | Comments (0)

Samsung Smart TV flaw leaves devices open to hackers

April 27th, 2017

Researchers warn that the TV’s lack of authentication means that a hacker could use it to access your Wi-Fi network

Posted in Law & order, Mobile, Neseso, Samsung, Samsung TV, Security threats, Smart TV, Vulnerability, Wi-Fi Direct | Comments (0)

Samsung Smart TV flaw leaves devices open to hackers

April 27th, 2017

Researchers warn that the TV’s lack of authentication means that a hacker could use it to access your Wi-Fi network

Posted in Law & order, Mobile, Neseso, Samsung, Samsung TV, Security threats, Smart TV, Vulnerability, Wi-Fi Direct | Comments (0)