An attacker can lock you out of the app using just your phone number and without requiring any action on your part. If you use WhatsApp, you may want to be wary of an attack where cybercriminals could suspend your account using only your phone number. The underlying loophole abuses a lapse in security of … More WhatsApp flaw lets anyone lock you out of your account
What are some of the key security risks to be aware of when using USB flash drives and how can you mitigate the threats? Most of you probably own at least one USB thumb drive, which you typically use either to transfer data or as a backup for sensitive documents. Alternatively, you may like to carry … More How safe is your USB drive?
It’s easy to reset your password or PIN after a data breach. But reset your face? Not so much. You can reset your PIN after a data breach, you can reset your password after a data breach, you can reset your security questions after a data breach – but can you reset your face? Sure, … More Had your face stolen lately?
The vulnerability could allow criminals to rack up fraudulent charges on the cards without needing to know the PINs. A team of researchers from the Swiss Federal Institute of Technology in Zurich (ETH Zurich) has found a security vulnerability in Visa’s EMV contactless protocol that could allow attackers to perform PIN bypass attacks and commit … More Security flaw allows bypassing PIN verification on Visa contactless payments
From the humble passcode to biometric authentication, there are quite a few options to lock your Android phone. But which of them are more secure than the others? As people become more sensitive about the privacy and security of their data, you’d think that securing your phone with at least some kind of authentication measure … More How secure is your phone’s lock screen?