Recent data breaches and malware phishing attacks have unfortunately become the “new norm” in today’s digital world. Cybercriminals target Internet users of all stripes to gain access to online accounts associated with an email address, such as online banking. A consumer alert from the IRS reported a 400% increase in online phishing and malware attacks during the 2016 U.S. tax season. Phishing attacks resulting from successful data breaches and stolen… Read more


November 25, 2016 - Guest Blogger Lars Birkeland, Marketing Director of Promon
Tesla cars can be stolen by hacking the app

Our researchers have demonstrated that because of lack of security in the Tesla smartphone app, cyber criminals could take control of the company’s vehicles, to the point where they can track and locate the car in real-time, and unlock and drive the car away unhindered. Such a hack gives criminals total control of the vehicle, providing additional functionality to that exposed by Keen Security Labs in a different hack in… Read more


The silent nature of all mobile attacks is what makes them so damaging. Sadly, users are still their own worst enemy as they are not taking the safeguards to help protect themselves in digital mobile market today. As reported by Infosecurity Magazine, today, only 45% report locking their phone with a pin, password or biometric. Yet 83% of consumers are extremely, very or somewhat concerned about Identity theft in America… Read more


The debate over the relative importance of mobile banking was settled long ago. Mobile banking is already the number one channel for many customers of financial institutions, it is being used by about half of those with a banking relationship, it has grown to become the number two preferred channel overall and will soon become number one, and there is nothing on the horizon that can reverse these trends. Unlike… Read more


October 14, 2015 - Jan Valcke
system hacked

The lyrics, “Get your motor running, head out on the highway” may bring a lot more adventure in the future. Two security researchers wirelessly hacked a Jeep while it was being driven. They were able to take car hacking to the next level. They moved beyond dashboard functions and were able to compromise critical control mechanisms such as steering, transmission and brakes. The significance of this threat is off the… Read more


Gen Y as the Next Threat Vector

As each new generation becomes more technologically advanced, banks and other service providers need to respond quickly to new expectations, and nowhere is this more apparent than with the generation we often call Gen Y, or the Millennial Generation. Gen Y has raised the bar when it comes to adoption of new technology, and the speed at which we must innovate. For example, they’re much more likely to use mobile… Read more


June 26, 2015 - Jan Valcke
The final days of user names and passwords

Last week’s announcement that the online password manager LastPass was hacked, made me realize that the term Secure Password has become the leading oxymoron of the 21st century. The issue of insecure passwords has resurfaced; this is once again a reminder to the need for one-time passwords. The average internet user typically administers twenty-five accounts. These twenty-five accounts are protected by on average six different static passwords, but users seem… Read more


October 15, 2014 - John Gunn
Fear Not the Mega-Breach (it’s the little ones that’ll get you):

A few years ago, the words hacking and breach weren’t used often in everyday conversation, and the victims were someone other than you. Following massive data breaches at Target, Home Depot, Neiman Marcus, Jimmy John’s and others, and have a majority of Americans impacted by hackers stealing credit card numbers. It may sound counter-intuitive, but this is not your biggest risk. I made regular purchases at three out of the… Read more


August 7, 2014 - Guest
Over 561 million data records were compromised worldwide in 2013

Written by Rachael Dallas, Wick Hill’s VASCO Product Manager. Every day I login to various web pages for a multitude of reasons; information, emails etc but mainly shopping….. I am a girl after all! Behind each login is information I view as highly sensitive and could impact my life on a large scale if someone was to guess/hack my static passwords (yes even I STILL have static passwords…. through no choice of… Read more


Diving in to the Deep End of Holiday Security Risk

We are in the middle of the holiday season and while it may be the most enjoyable part of the year, it’s definitely not the safest part of the year. We all take our technology gear with us on holiday, as we told the kids there will be internet available. And us corporate types want to connect quickly to the corporate network in case an urgent problem may pop up…. Read more