Security

ComputerWorldIndependent

Email to Essential smartphone users causes alarm

Credit to Author: John Brandon| Date: Thu, 31 Aug 2017 13:52:00 -0700

The term “improperly configured” is a real plague on the IT landscape.

It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.

Essential phone recently sent an email to customers asking for proof of identity. This request was a little odd in the first place — who does that anymore? The email basically asked customers to send a picture of a photo identification or passport by email. From a security standpoint, that’s a bit like asking people to text your credit card number to a hacker.

To read this article in full or to leave a comment, please click here

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 28, 2017

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 01 Sep 2017 13:25:14 +0000

The only topic I can bring up this week is the devastation in Texas caused by Hurricane Harvey. Many cities have been completely destroyed and to add insult to injury, Harvey moved back to the Gulf of Mexico and made landfall again in Louisiana. Catastrophic flooding has left tens of thousands without their homes and…

Read More
ComputerWorldIndependent

One big lesson from the Essential smartphone email fiasco

Credit to Author: John Brandon| Date: Thu, 31 Aug 2017 13:52:00 -0700

The term “improperly configured” is a real plague on the IT landscape.

It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.

Essential phone recently sent out an email to customers asking for proof of identity. This request was a little odd in the first place–who does that anymore? The email basically asked customers to send a picture of a photo identification or passport by email. From a security standpoint, that’s a bit like asking people to text your credit card number to a hacker.

To read this article in full or to leave a comment, please click here

Read More