An experiment in securing WebRTC
Posted on 27 October 2014 by
See how Gemalto’s R&D team developed a WebRTC-based VOIP demo secured using a SIM card and the W3C secure element access API.
Posted on 27 October 2014 by
See how Gemalto’s R&D team developed a WebRTC-based VOIP demo secured using a SIM card and the W3C secure element access API.
Posted on 01 September 2011 by
According to this article from USA Today last week, cyber-attacks are set to increase over the remainder of this year due to the widespread availability of a new SpyEye hacker toolkit. The software allows hackers or cybercriminals to control a network of up to thousands of botnets, which can then be used for spamming, DDOS […]
Posted on 20 September 2011 by
Recently, @briankrebs highlighted a Trojan attack which showed quite how sophisticated some cyber attacks are now becoming. The case in question is being investigated by German police, and involves a new piece of malware which convinces online banking customers to willingly transfer their own money into the accounts of criminals. This particular case shows that, sometimes, even a layered […]
Posted on 18 May 2012 by
As a PC user who converted for a short time to Mac and came back to PC, I’m used to hearing the comments from Apple enthusiasts about the superior security and lack of virus threats on the Mac OS system. I took some heat for my decision to return to a PC from my Mac […]
Posted on 09 October 2012 by
This October marks the ninth annual National Cyber Security Awareness Month. Sponsored by the Department of Homeland Security in cooperation with the National Cyber Security Alliance (NCSA) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), this month is a time to raise awareness about protecting yourself and your information online. As the presidential election […]
Posted on 28 November 2011 by
Today we’re using our smartphones the same way we use our computers – to surf the Web, make financial transactions, conduct business, and download software. Increasingly, we’re also using the same device for personal and business use. So why aren’t we protecting our phones the same way we do our computers? With rising threats of […]