On The Vulnerability Of TouchID

There has been a lot of media attention given to the teams of researchers who claim to have "hacked" the TouchID fingerprint system that can be used to secure access to an Apple iPhone 5S.    However, these researchers had two unfair advantages:  They knew which finger to use, and they…

#Tags: iPhone, iOS, Security

A Comparison of Credit Card Technologies & Security

Given all of the recent credit card breaches at merchants like Target and Home Depot, you may be wondering how your credit card payments could be more secure and out of the reach of hackers. You're not alone! However, the buzzwords and technical terms surrounding credit cards and mobile payments…

#Tags: Security, Payments

A Narrative on Apple Pay, Google Wallet, CurrentC, & Mobile Payments

Apple Pay's introduction has certainly generated a lot of press coverage, especially as it relates to its banishment by retailer-led consortium MCX. However, a lot of the articles I've read contain a great deal of incorrect information about Apple Pay and other mobile payment methodologies, so I thought it might…

#Tags: Payments, Security

Lessons To Be Learned From The Sony Hack

UPDATE: Sony Pictures Co-Chair Amy Pascal has stepped down in the wake of the cyberattack. It seems that most of the mainstream media are concerned these days with attributing the Sony hack to North Korea, a recently discharged insider, some lone hackers, or a combination thereof. What hasn't been discussed…

#Tags: Security, Breach

DUAL_EC_DRBG Backdoors And Why You Should Care

It is looking more and more likely pretty damned obvious that the NSA managed to get a weakness introduced into a widely used random number generating algorithm standard (DUAL_EC_DRBG) that was approved for use by NIST (the National Institute of Standards and Technology) for US Government use. Such…

#Tags: Security, Encryption