Some fraudsters may use low-tech tactics to steal your sensitive information – peering over your shoulder as you enter that data is one of them. We live in an age of pervasive connectivity. But our always-on, mobile-centric lives also expose us to risk. For many people, it is the prospect of phishing, remotely deployed malware … More Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone
An attacker can lock you out of the app using just your phone number and without requiring any action on your part. If you use WhatsApp, you may want to be wary of an attack where cybercriminals could suspend your account using only your phone number. The underlying loophole abuses a lapse in security of … More WhatsApp flaw lets anyone lock you out of your account
What are some of the key security risks to be aware of when using USB flash drives and how can you mitigate the threats? Most of you probably own at least one USB thumb drive, which you typically use either to transfer data or as a backup for sensitive documents. Alternatively, you may like to carry … More How safe is your USB drive?
It’s easy to reset your password or PIN after a data breach. But reset your face? Not so much. You can reset your PIN after a data breach, you can reset your password after a data breach, you can reset your security questions after a data breach – but can you reset your face? Sure, … More Had your face stolen lately?
The vulnerability could allow criminals to rack up fraudulent charges on the cards without needing to know the PINs. A team of researchers from the Swiss Federal Institute of Technology in Zurich (ETH Zurich) has found a security vulnerability in Visa’s EMV contactless protocol that could allow attackers to perform PIN bypass attacks and commit … More Security flaw allows bypassing PIN verification on Visa contactless payments