information security

4 Tips for Spring Cleaning Your Digital Life

Spring is in the air (if you’re in the northern hemisphere) and it’s traditionally a time to clean every nook and cranny and get rid of excess stuff in your house. But it’s also a good time to clean up your digital life. Just like your house, your digital life needs a good cleaning once in a while, but sometimes this can seem like a daunting task, so here’s some tips for you to get started.

 

International

4 Tips for Spring Cleaning Your Digital Life

Spring is in the air (if you’re in the northern hemisphere) and it’s traditionally a time to clean every nook and cranny and get rid of excess stuff in your house. But it’s also a good time to clean up your digital life. Just like your house, your digital life needs a good cleaning once in a while, but sometimes this can seem like a daunting task, so here’s some tips for you to get started.

 

U.S.

5 things all Anthem customers should do after the massive data breach

The Anthem data breach revealed last week could affect up to 80 million people, and the investigation into the scope of the crime is just starting. Any breach that exposes data from millions of customers (or even thousands really) is bad, but the Anthem breach is actually worse than retail breaches like Target because of the type of information that was compromised. 

 

International

5 things all Anthem customers should do after the massive data breach

The Anthem data breach revealed last week could affect up to 80 million people, and the investigation into the scope of the crime is just starting. Any breach that exposes data from millions of customers (or even thousands really) is bad, but the Anthem breach is actually worse than retail breaches like Target because of the type of information that was compromised. 

 

U.S.

Blogs, other content management sites targeted by password thieves

August 07, 2013CSO — Brute force attacks to pry login credentials from content management sites like blogs have been growing as more data robbers use a short-term gain for a bigger pay-off later on.

Such sites are attractive targets because they tend to be less secure than other environments -- such as financial services -- and since they're interactive by design, "drive-by" malware planted on them can infect a lot of users quickly, said David Britton, vice president of industry solutions at 41st Parameter.

U.S.

Are non-payment NFC applications secure?

Non-payment NFC applications are not one-size-fits-all where the same level of security is required or needed. For example, you don’t need the same level of security for a coupon as you would an identity application. Application developers know this, too, and incorporate the appropriate amount of security depending on the application. Applications that use sensitive data such as you identity information will always be stored in the secure element, where it cannot be tampered with or stolen.

See also,

U.S.

Are NFC mobile payments secure?

NFC mobile payments are very secure. NFC-enabled mobile devices, which are readily available today, have a chip inside of them called a “secure element.” The payment application and your payment account information is stored in this special chip, making it invulnerable to attack. The method through which your mobile device relays information wirelessly is also very secure. The communication between a mobile phone and point-of-sale terminal use a globally recognized standard called ISO 14443 – this is the same standard used today for EMV and U.S. contactless payment cards.

U.S.

Pages

Subscribe to information security