Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
In the world of information technology, achieving a status of total security is a goal that is practically impossible. In particular, one of the most persistently sought objectives is to find authentication and identification methods that come close to this total security utopia. Can biometrics bring progress in this issue?
Mobile Pwn2Own 2014, an event focused on discovering vulnerabilities targeting last generation mobiles, compromised five top quality smartphones. Different techniques were used to compromise these, being NFC the technology used to vulnerate Samsung Galaxy 5 and LG Nexus 5 and getting control of the mobile.
It is not the first time NFC stars in security news. Not too long ago we could see how a...
With the announcement of the new fingerprint sensor in the latest smartphone from Apple, the iPhone 5S, biometric sensors are again under scrutiny among information security professionals.
Especially because the use of these technologies is becoming popular for consumer grade electronics, and its use use could become ubiquitous for something made to protect sensitive data, like information...