Onegini introduced Multi-Factor Authentication at the Liferay Developer event. It was great to see the community embracing a solution like this. In this post we combined an FAQ, the full presentation and the slides in case you missed it. Hope you enjoy it as much as we did.
Let’s start with a statistic: nowadays 97% of all hacks involve exploiting people. From (spear)-phishing (email), baiting (infected USB), or impersonation (also known as Vishing, or Voice Solicitation). As we take more technical measures, fraudsters are moving towards social engineering. Please have a look at the following video:
Apigee a Google Cloud Platform company and Onegini will cover the security on API level and on mobile level to help you understand what to look for when opening up your data to the outside world and achieve real end-to-end security.
However you perceive the reality, the truth is that your data is constantly at risk. And you probably know this already. This includes advertisers, the FBI, hackers, and phishers, and a myriad of snoopers that all strive for access to your digital activity. Although some of them want to – or at least claim they want to – protect you
As mobile gadgets continuously occupy more and more room in everyone’s lives, mobile security is becoming more and more difficult to handle. Every mobile gadget, whether it’s a tablet or a smartphone, supplies hackers with a new way to intrude into users’ personal space and get to their private data
Most articles and blog posts written on the topic of Android security concentrate on malware-scanning solutions, usch as Norton, AVG, and Lookout. However, with the protection layers already embedded into the platform, those kinds of applications are mostly unnecessary and frequently inefficient, or even unnecessarily expensive.
Thirteen new Android flaws have been patched by Google. Two of them could permit attackers to gain control over Android gadgets connected to the same wireless network, in case they have Broadcom chips.
The Islamic State is employing an encrypted Android communication app of its own. This was predicted by specialists that resist government efforts of demanding encryption backdoors to look clearly into correspondence between criminals and know what they are saying to one another.