Security News

Vocera introduced its new cloud-based clinical communication and collaboration solution for smartphones called Vocera Edge. Designed for the cloud, Vocera Edge enables healthcare systems to get the most out of their electronic health record investments, while empowering nurses, physicians, and other care team members by delivering meaningful information at the point of care.

Microsoft on Monday announced that it has included the Teams mobile applications for Android and iOS within the scope of its bug bounty programs. The company added the desktop client of the Teams business communication platform to the Applications Bounty Program back in March, and is now expanding the program to include the mobile clients as well.

Microsoft's Applications Bounty Program has been extended to cover Microsoft Teams mobile apps, and bug hunters can earn up to $30,000 for reports about specific vulnerabilities. Microsoft Teams is an enterprise communication and collaboration platform that provides workspace one-on-one and group chat, videoconferencing, VoIP, file sharing and storage, and meetings.

The study was conducted to provide banking, financial services, and investing/trading mobile apps with insights on the state of mobile app login authentication and the friction when a user resets their password. This surge in both fraud losses and mobile usage highlights the need of financial services companies to look to multi-factor authentication solutions that provide stronger security than passwords without interfering with a great mobile user experience, a key competitive advantage in today's app-driven world.

Kdan Mobile Software announced that it has raised $16M in Series B funding from a who's who of global investors, including Dattoz Partners, WI Harper Group, Taiwania Capital and Golden Asia Fund Mitsubishi UFJ Capital. Lead Series B investor, Dattoz Partners, will take a seat on the Kdan Mobile Board to help guide the company as it expands its global footprint.

HUMAN Security announced its newly-named BotGuard and a range of new features to further help enterprise customers defend their website and mobile applications from sophisticated bot attacks and fraud. BotGuard is powered by the Human Verification Engine, which combines technical evidence, machine learning, and continuous adaptation to deliver "Human or not" bot detection decisions with accuracy.

To help achieve progress on Zero Trust, there is now a new, easy way to implement continuous user verification by connecting directly to the authentication systems used by mobile operators - without the overhead of processing or storing user data. The Zero Trust model of identity verification essentially means never trusting that a returning user is whom they claim to be, regardless of their location or previous successful attempts.

The Car Connectivity Consortium announced that its CCC Digital Key Release 3.0 specification is finalized and now available to CCC members. "The CCC Digital Key already enables your mobile device to be used as a key for your vehicle," said Daniel Knobloch, president, CCC. "With the CCC Digital Key Release 3, the user experience just got even better. The combination of Ultra Wideband and Bluetooth Low Energy will allow you to leave your mobile device in your bag or pocket when approaching to unlock and start your vehicle - making Digital Key even more convenient."

Mint Mobile has disclosed a data breach after an unauthorized person gained access to subscribers' account information and ported phone numbers to another carrier. According to the data breach notification email sent to affected subscribers this weekend, between June 8th and June 10th, a threat actor ported the phone numbers for a "Small" number of Mint Mobile subscribers to another carrier without authorization.

AdaptiveMobile Security announced a new trio of interconnected 5G security platforms that allows carriers to protect against internal and external security threats to their 5G infrastructure. 5G networks must therefore be secured at the interconnects with external networks and systems deployed to prevent nation state adversaries and criminal organizations using other perceived 'trusted' networks to execute missions against an operator's 5G infrastructure.