Tag: Technical & Product

Discovering Threat-Aware Identity and Access Management

IBM Pulse Protect 2014 will introduce “the new face of IAM," IBM Security Identity and Access Management solutions redesigned to help deliver access services safely, efficiently and cost-effectively to internal and external users within security...

The Return of Image Spam

Image spam had its heyday in 2006 and 2007 with more than 40% of all spams contained an image attachment. By the summer of 2007, the game seemed to be over and image spam threats stopped almost completely. Nearly five years later, in December 2013,...

A New Vulnerability in the Android Framework: Fragment Injection

We have recently disclosed a new vulnerability to the Android Security Team. The vulnerability affected many apps, including Settings (the one that is found on every Android device), Gmail, Google Now, DropBox and Evernote. To be more accurate, any...

Is the Internet Killing Knowledge Based Authentication?

Something only the user knows. Most of us have encountered Knowledge Based Authentication (KBA), though we might not have realized it had a name. Think back to a time when you phoned your mortgage or credit card company to discuss your account. They...