Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand

A new, improved version of Darcula, a cat-themed phishing-as-a-service (PhaaS) platform aimed at serving Chinese-speaking criminals, will be released this month and will allow malicious users to create customized phishing kits to target a wider variety… Continue reading Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand

Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?

The twin cryptocurrency and digital identity revolutions are supposed to be building a better future, where anybody can take charge of their sovereignty and security in a world where both face unprecedented threats. Yet at one crucial level, the decent… Continue reading Decentralization is happening everywhere, so why are crypto wallets “walled gardens”?

How digital wallets work, and best practices to use them safely

With the adoption of digital wallets and the increasing embedding of consumer digital payments into daily life, ensuring security measures is essential. According to a McKinsey report, digital payments are now mainstream and continually evolving, bring… Continue reading How digital wallets work, and best practices to use them safely

Stolen, locked payment cards can be used with digital wallet apps

Fraudsters can add stolen payment cards to digital wallet apps and continue making online purchases even after victims’ report the card stolen and the bank blocks it, computer engineers with University of Massachusetts Amherst and Pennsylvania St… Continue reading Stolen, locked payment cards can be used with digital wallet apps

How decentralized identity is shaping the future of data protection

In this Help Net Security interview, Patrick Harding, Chief Architect at Ping Identity, discusses the promises and implications of decentralized identity (DCI) in cybersecurity. By redistributing identity management responsibilities among issuers, hold… Continue reading How decentralized identity is shaping the future of data protection

Beyond blockchain: Strategies for seamless digital asset integration

In this Help Net Security interview, Jean-Philippe Aumasson, CSO at Taurus, emphasizes the often-overlooked complexities of key generation, storage, and distribution, underlining the necessity for a high level of security maturity in handling digital a… Continue reading Beyond blockchain: Strategies for seamless digital asset integration

Rising fintech trends for 2024: From A2A payments to GenAI in banking

The fintech market is undergoing a rapid shift, with the rise of new technologies, such as Open Finance, generative AI and A2A (Account-to-Account) payments having a major impact on business models, according to Juniper Research. This is combined with … Continue reading Rising fintech trends for 2024: From A2A payments to GenAI in banking

Overcoming industry obstacles for decentralized digital identities

In this Help Net Security interview, Eve Maler, CTO at ForgeRock, talks about how digital identities continue to play a critical role in how we access online services securely. Maler also highlights the challenges encountered by various industries in i… Continue reading Overcoming industry obstacles for decentralized digital identities

The Dangerous Flaws of Web3 Security, According To a Former Hacker

“New and improved” is the refrain of progress, but new technology doesn’t always turn out to be an improvement. In the case of the evolution from Web2 to Web3, a former hacker revealed how recent changes have created an all-new avenue of potential attack. Recent updates were intended to tighten security. “Due to blockchain technology […]

The post The Dangerous Flaws of Web3 Security, According To a Former Hacker appeared first on Security Intelligence.

Continue reading The Dangerous Flaws of Web3 Security, According To a Former Hacker