Diving into Summer Vacation Security Risks

We are in the middle of the holiday season, and while it may be the most enjoyable part of the year, it’s definitely not the safest. We all take our technology gear with us on vacation, the kids enjoy their devices and professionals today worry about completely disconnecting from their work responsibilities. Here’s the problem, security threats don’t stop just… Read more

Recent data breaches and malware phishing attacks have unfortunately become the “new norm” in today’s digital world. Cybercriminals target Internet users of all stripes to gain access to online accounts associated with an email address, such as online banking. A consumer alert from the IRS reported a 400% increase in online phishing and malware attacks during the 2016 U.S. tax… Read more

November 25, 2016 - Guest Blogger Lars Birkeland, Marketing Director of Promon
Tesla cars can be stolen by hacking the app

Our researchers have demonstrated that because of lack of security in the Tesla smartphone app, cyber criminals could take control of the company’s vehicles, to the point where they can track and locate the car in real-time, and unlock and drive the car away unhindered. Such a hack gives criminals total control of the vehicle, providing additional functionality to that… Read more

October 7, 2016 - Shane Stevens

The silent nature of all mobile attacks is what makes them so damaging. Sadly, users are still their own worst enemy as they are not taking the safeguards to help protect themselves in digital mobile market today. As reported by Infosecurity Magazine, today, only 45% report locking their phone with a pin, password or biometric. Yet 83% of consumers are… Read more

The debate over the relative importance of mobile banking was settled long ago. Mobile banking is already the number one channel for many customers of financial institutions, it is being used by about half of those with a banking relationship, it has grown to become the number two preferred channel overall and will soon become number one, and there is… Read more

October 14, 2015 - Jan Valcke
system hacked

The lyrics, “Get your motor running, head out on the highway” may bring a lot more adventure in the future. Two security researchers wirelessly hacked a Jeep while it was being driven. They were able to take car hacking to the next level. They moved beyond dashboard functions and were able to compromise critical control mechanisms such as steering, transmission… Read more

Gen Y as the Next Threat Vector

As each new generation becomes more technologically advanced, banks and other service providers need to respond quickly to new expectations, and nowhere is this more apparent than with the generation we often call Gen Y, or the Millennial Generation. Gen Y has raised the bar when it comes to adoption of new technology, and the speed at which we must… Read more

June 26, 2015 - Jan Valcke
The final days of user names and passwords

Last week’s announcement that the online password manager LastPass was hacked, made me realize that the term Secure Password has become the leading oxymoron of the 21st century. The issue of insecure passwords has resurfaced; this is once again a reminder to the need for one-time passwords. The average internet user typically administers twenty-five accounts. These twenty-five accounts are protected… Read more

October 15, 2014 - John Gunn
Fear Not the Mega-Breach (it’s the little ones that’ll get you):

A few years ago, the words hacking and breach weren’t used often in everyday conversation, and the victims were someone other than you. Following massive data breaches at Target, Home Depot, Neiman Marcus, Jimmy John’s and others, and have a majority of Americans impacted by hackers stealing credit card numbers. It may sound counter-intuitive, but this is not your biggest… Read more

August 7, 2014 - Guest
Over 561 million data records were compromised worldwide in 2013

Written by Rachael Dallas, Wick Hill’s VASCO Product Manager. Every day I login to various web pages for a multitude of reasons; information, emails etc but mainly shopping….. I am a girl after all! Behind each login is information I view as highly sensitive and could impact my life on a large scale if someone was to guess/hack my static passwords (yes… Read more