Apple app developer news Android app developer news

Application Security News

App security news so developers can protect their code, and users.
Why your app should have OAuth 2.0

Why your app should have OAuth 2.0

Tuesday, November 14, 2017 by

Consumer demand couldn’t be more clear - the more apps, the better. On average, consumers launch at least nine apps per day and more than 30 each month, and they tend to browse such apps for hours at a time. Users spend more than three hours a day on their smartphones, and nearly 90 percent of that time is devoted to apps. While much is made of app responsiven...

SlashNext launches AI internet threat protection system

SlashNext launches AI internet threat protection system

Thursday, November 09, 2017 by

SlashNext announced the company’s broad market release of the SlashNext Internet Access Protection System to protect organizations from cross platform social engineering and phishing, malware, exploits and callback attacks. The system goes beyond first generation signature-based and second generation sandbox-based technologies and deploys artificial intelligence and cog...

The battle of biometric security coming in 2018

The battle of biometric security coming in 2018

Friday, November 03, 2017 by

Fingerprint sensors first appeared in smart devices in 2007 and then gained momentum as a 4-digit PIN code replacement in 2013's Apple iPhone 5S. Hailed as the future of authentication by some, fingerprint's security weaknesses were quickly exposed by the children of sleepy dads, cats' paws and gummy bears. Still, the lure of convenience today and the promise of securit...

Flexera issues warning about Cyberattacks

Flexera issues warning about Cyberattacks

Tuesday, October 24, 2017 by

As 143 million Equifax consumers continue to pick up the pieces from stolen Social Security numbers, birth dates, drivers’ licenses, addresses and credit card numbers, Flexera has another warning - expect a long tail of incidents and breaches in the months and years to come.Flexera surveyed over 400 software suppliers, Internet of Things (IoT) manufacturers and in-house...

IoT Cybersecurity is top concern says BlackBerry report

IoT Cybersecurity is top concern says BlackBerry report

Friday, October 20, 2017 by

BlackBerry Limited has announced findings from a new global research whitepaper, which surveyed IT decision makers on corporate IoT deployments. Conducted by 451 Research, the whitepaper titled, “Securing the Enterprise of Things: Opportunity for securing IoT with a unified platform emerging as IoT popularity grows,” reveals that huge opportunities are balanced against ...

Automated Security as a Service platform by ShiftLeft launches

Automated Security as a Service platform by ShiftLeft launches

Monday, October 16, 2017 by

ShiftLeft Inc. has introduced an automated Security as a service (SECaaS) for cloud software that creates custom security and threat detection for each application it supports. With ShiftLeft, organizations can now secure their cloud applications as part of their continuous integration pipeline, rather than merely reacting to threats discovered in production. ShiftLeft ...

Cloud security platform Capsule8 raises $6M

Cloud security platform Capsule8 raises $6M

Thursday, September 28, 2017 by

Capsule8 has announced it has completed a $6 million round of funding. This round brings total funding to more than $8.5 million for the security provider, which recently announced the beta version of Capsule8 Protect that is being deployed by some of the biggest companies on Wall Street and in Silicon Valley. Capsule8 will use its latest round of funding to further dev...

Stop the menace of Android rooting malware attacks with RASP

Stop the menace of Android rooting malware attacks with RASP

Monday, September 25, 2017 by

One of the key security issues facing organizations that support Android devices is the risk of rooting malware. A number of malware families on the Android mobile OS attempt to obtain root access once installed because the elevated privileges gained come in handy to perform malicious activities. What you need to know about Tordow v2.0 and PegasusThe Tordow v2.0 malware...

Behavioral and biometric mobile authentication will end passwords

Behavioral and biometric mobile authentication will end passwords

Friday, September 15, 2017 by

You can say this about passwords: they're incredibly resilient. Not in a bulletproof kind of way but, more precisely, in terms of how long they've been around. According to Robert Svensson in his book "From Hacking to Report Writing: An Introduction to Security and Penetration," the first computer system to use passwords was built by researchers at the Massachusetts Ins...

Carriers team up to provide better mobile authentication

Carriers team up to provide better mobile authentication

Thursday, September 14, 2017 by

Mobile users are faced with the challenge of managing dozens of difficult-to-remember passwords for many applications. Even with the best user practices, hackers can social engineer passwords from users, leaving consumers and enterprises vulnerable to identity theft, bank fraud, fraudulent purchases and data theft.To help tackle this issue, AT&T, Sprint, T-Mobile an...

Four privacy questions every developer needs to answer

Four privacy questions every developer needs to answer

Wednesday, September 13, 2017 by

Over the past twelve months, the internet-connected doll My Friend Cayla went from one of the hottest toys of the holiday season to an internationally-classified "espionage device." The doll was the subject of an FBI warning, banned from sale or ownership in Germany, and eventually dropped from every major retailer in the United States. Despite the nearly universally hi...

Tips for securing container deployments

Tips for securing container deployments

Friday, September 01, 2017 by

Container deployments are still susceptible to the regular threats that other types of deployments are - including DDoS and cross-site scripting attacks. In fact, hackers often take advantage of compromised containers to scan sensitive data, download malware, or privilegeunauthorized access to any of your containers, hosts or data centers.Fei Huang is the CEO of NeuVect...

The HBO hack reveals how vulnerable data is to black hats

The HBO hack reveals how vulnerable data is to black hats

Thursday, August 31, 2017 by

The HBO hack is the latest in a string of high-profile hacks over the last two years (Dropbox, Yahoo!, UK Ministry of Health) where a handful of vulnerable servers were compromised and used to take down and steal information. Studies have shown the next year represent a turning point in the digitization of enterprise content. A recent Forrester study commissioned by Alf...

Codeless security integrations by Blackberry and Appdome announced

Codeless security integrations by Blackberry and Appdome announced

Tuesday, August 15, 2017 by

BlackBerry Limited and Appdome, a cloud hub for mobile app integration, announced they are enabling codeless integration of secure voice, video and messaging capabilities. Available under Appdome’s newest service category, Secure Messaging, the BBM Enterprise SDK (software development kit) offers a growing set of secure communications capabilities that mobile app develo...

Veracode announced two new key integrations

Veracode announced two new key integrations

Friday, August 11, 2017 by

Veracode, a software security company acquired by CA Technologies, has announced the Veracode HPE Application Lifecycle Manager (ALM) Flaw Synchronizer Plug-in, which empowers development and QA/release engineers to fix security vulnerabilities early in the Software Development Lifecycle (SDLC). The company also announced an enhanced integration to the Veracode Applicat...

NoSQL databases can now use Hackolade's CLI

NoSQL databases can now use Hackolade's CLI

Tuesday, August 08, 2017 by

With GDPR quickly approaching, Hackolade has announced its Command Line Interface (CLI) to help companies with the pending GDPR (General Data Protection Regulation) regulatory compliance (scheduled for May 25, 2018), along with overall corporate data governance needs. The CLI is currently available for the following NoSQL databases: MongoDB, Couchbase, DynamoDB, and Azu...

Developers are most wary of these technologies being hacked

Developers are most wary of these technologies being hacked

Wednesday, August 02, 2017 by

In a new survey by Netsparker Ltd., a provider of web applications security, developers agreed that the government and financial services are the two sectors most vulnerable to hacking and that smart home IoT is the most vulnerable technology.Propeller Insights conducted the recent survey of U.S.-based software developers for Netsparker from July 5-7, 2017.Government mo...

Checkmarx acquired Codebashing

Checkmarx acquired Codebashing

Tuesday, July 25, 2017 by

Checkmarx has acquired Codebashing, an application security education company that delivers Game-like AppSec Training for Developers.Traditional secure coding education is ineffective and cannot scale to deliver continuous and across the board secure coding knowledge. Long training courses disrupt the developer’s daily routine and don't address the specific challenge as...

HUMANOBOT can discover non-human activities trying to commit fraud

HUMANOBOT can discover non-human activities trying to commit fraud

Tuesday, July 25, 2017 by

SecuredTouch's HUMANOBOT behavioral biometrics tech has recently fine-tuned its platform to better detect non-human activities like bots and emulators trying to commit fraud. HUMANOBOT detects non-human behavior generated by bots, malware, and automated scripts and stops fraud-focused emulators within mobile applications.The system recognizes these behaviors using advan...

InnoVault lets you embed end-to-end data security encryption to apps

InnoVault lets you embed end-to-end data security encryption to apps

Friday, July 21, 2017 by

Tozny, which has built a secure, privacy-preserving and password-free mobile authentication system, has announced the launch of InnoVault, an easy-to-use toolkit allowing developers to embed end-to-end data security encryption capabilities into their websites, apps, or software. As a result, developers can now raise the level of their data security and privacy managemen...

Next Page >>Last >>     

Subscribe to App Developer Daily

Latest headlines delivered to you daily.