Home Tags Signature

Tag: Signature

Back to the iPhone future: Lessons from a decade of Apple...

iPhones spurred big changes in learning and practicing medicinemdash;and there may be more.

Persona 3’s ending made me appreciate all of life’s little endings

Learning to accept inevitable loss through a video game’s poignant example.

Nigerian phishing: Industrial companies under attack

In late 2016, the Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team reported on phishing attacks that were primarily targeting industrial companies from the metallurgy, electric power, construction, engineering and other sectors.

As further research demonstrated, this was just part of a bigger story that began much earlier and is unlikely to end any time soon.

Fire Emblem Echoes: Shadows of Valentia review: Hard reboot

A stylish remake that could benefit from a whole lot more substance.

Uber, Lyft returning to Austin as driver-fingerprinting dispute ends

Legislation, to be signed by Texas Gov.

Greg Abbott, paves way for some comebacks.

Something about Trump cybersecurity executive order seems awfully familiar

Trumprsquo;s cybersecurity order cribs from his predecessor, despite campaign bluster.

DocuSign’s Brand Used in Phishing Attacks

The electronic signature company issued an update alert today that it noticed a rise in phishing attacks last week and this morning.

Digital signature service DocuSign hacked and email addresses stolen

Digital signature service DocuSign said Monday that an unnamed third-party had got access to email addresses of its users after hacking into its systems.The hackers gained temporary access to a peripheral sub-system for communicating service-related announcements to users through email, the company said.
It confirmed after what it described as a complete forensic analysis that only email addresses were accessed, and not other details such as names, physical addresses, passwords, social security numbers, credit card data, or other information.[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]“No content or any customer documents sent through DocuSignrsquo;s eSignature system was accessed; and DocuSignrsquo;s core eSignature service, envelopes, and customer documents and data remain secure,” DocuSign said in a post.

To read this article in full or to leave a comment, please click here

WCry is so mean Microsoft issues patch for 3 unsupported Windows...

Decommissioned for years, Windows XP, 8, and Server 2003 get emergency update.

False Positives: Why Vendors Should Lower Their Rates and How We...

In pursuit of a high cyberthreat detection rate, the some developers of cybersecurity solutions neglect the subject matter of false positives, and unfairly so. Regretfully, only then does the idea dawn on these developers that high-quality protection from cyberthreats involves not only prevention but also a low false-positive rate.

Newly-signed federal spending bill spares energy research for 4 months

ARPA-E, slated for cuts, gets $15 million extra, EPA sees a 1 percent cut.

IDG Contributor Network: Double assurance: Biometric transaction signing on the blockchain

As I mentioned in my most recent post, solutions for legal non-repudiation are critical for organizations --- and biometrics are an ideal solution for data provenance.  Specifically, biometric authentication can be used to satisfy compliance with regulations such as the Payment Services Directive II (PSD2) consent requirements, which are critical for privacy, data provenance and non-repudiation.Currently, if you consent to a payment using “what you see is what you sign” (WYSIWYS) features via push notifications on a mobile device, a text record of that transaction is logged on the server.  But a simple text log entry is insufficient for non-repudiation. Proof is required that it was indeed a specific user that approved a given payment.

A biometric digital signature of the transaction within the associated log entry solves the non-repudiation problem by associating the transaction details with a user.To read this article in full or to leave a comment, please click here