Apple app developer news Android app developer news

Application Security News

App security news so developers can protect their code, and users.
InnoVault lets you embed end-to-end data security encryption to apps

InnoVault lets you embed end-to-end data security encryption to apps

Friday, July 21, 2017 by

Tozny, which has built a secure, privacy-preserving and password-free mobile authentication system, has announced the launch of InnoVault, an easy-to-use toolkit allowing developers to embed end-to-end data security encryption capabilities into their websites, apps, or software. As a result, developers can now raise the level of their data security and privacy managemen...

Software developers are easy targets for hackers study finds

Software developers are easy targets for hackers study finds

Thursday, July 20, 2017 by

Netsparker Ltd., a company in the web applications security industry, has released survey results showing that most software developers make themselves easy targets for hackers, even when they are behind a corporate firewall. The primary reason is not that their web server software is out of date, however. Instead, it is largely the result of developers running vulnerab...

Metadata can be deadly in cyber exploitation

Metadata can be deadly in cyber exploitation

Tuesday, July 18, 2017 by

When someone says "There's no cause for concern, it's only metadata" you can send them this:Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data po...

Cloud native app firewall Twistlock 2.1 launches

Cloud native app firewall Twistlock 2.1 launches

Monday, July 17, 2017 by

Twistlock, a provider of cloud container security solutions, has announced the availability of Twistlock 2.1. The latest release of their flagship product includes a first of its kind cloud native app firewall, vulnerability risk ranking that uses knowledge of an enterprise’s unique environment to prioritize what to fix first, a brand new dashboard and integrated secret...

New biometric authentication could be a password killer

New biometric authentication could be a password killer

Wednesday, July 12, 2017 by

Pramati Technologies has announced the ThumbSignIn biometric authentication SaaS platform for mobile and web applications and additionally its certification by the FIDO Alliance. The platform enables enterprises and service providers to deploy strong authentication solutions that reduce reliance on passwords and protect against phishing, man-in-the-middle, and replay at...

Apperian announces new security capabilities

Apperian announces new security capabilities

Monday, July 03, 2017 by

Apperian, an Arxan company and provider of mobile application management (MAM) and security solutions, has announced several platform enhancements, which increase the security of enterprise mobile app data. These updates take advantage of native device capabilities, multiple industry protocols and additional password controls, to provide a solution for distributing secu...

With DevOps security must work differently

With DevOps security must work differently

Tuesday, June 27, 2017 by

Because “software is eating the world,” as Mark Andreessen famously noted, application security gets harder every day; every line of code written opens organizations to new vulnerabilities and breaches. Furthermore, legacy solutions, such as static analysis, dynamic analysis and web application firewalls have failed to keep pace with Agile and DevOps practices. Teams ne...

VASCO launches overlay detection in DIGIPASS

VASCO launches overlay detection in DIGIPASS

Thursday, June 22, 2017 by

VASCO Data Security International, Inc., a provider of identity, security and business productivity solutions, has announced its ability to help organizations detect and mitigate mobile application overlay attacks through added functionality in the DIGIPASS for Apps Runtime Application Self-Protection (RASP) module.Overlay attacks are increasingly being deployed to stea...

Why runtime application self-protection is critical for app security

Why runtime application self-protection is critical for app security

Tuesday, June 20, 2017 by

Today most of us go about implementing security from the outside in. The common practice is to start by defining a perimeter and trying to defend it with various security tools. Even though perimeters have been porous for more than a decade, we still can’t give up this notion that if we build a better wall we can keep our enterprises safer.Certainly that is where most e...

DevSecOps will help security and developers play nice

DevSecOps will help security and developers play nice

Thursday, June 15, 2017 by

Veracode, a security software company acquired by CA Technologies, has announced the results of a study examining the relationships between application developers and security teams.The study, conducted in conjunction with Enterprise Strategy Group (ESG), shows that despite the pervasive belief that security and development teams have conflicting priorities, initiatives...

Enterprise threat dubbed HospitalGown infests thousands of apps

Enterprise threat dubbed HospitalGown infests thousands of apps

Tuesday, June 06, 2017 by

Appthority, an enterprise mobile threat protection company, published research on a newly discovered backend data exposure vulnerability, dubbed HospitalGown, that highlights the connection between mobile apps and insecure backend databases containing enterprise data. Appthority documented more than 1,000 apps with this vulnerability, and researched in detail 39 applica...

Hacking into unsecured webcams is too easy

Hacking into unsecured webcams is too easy

Thursday, June 01, 2017 by

Are You Being Watched?No other exploit is as vicious or expedient with its results as camera activation malware. An adversary is virtually guaranteed a successful blackmail or espionage campaign when you have compiled hours upon hours of video footage of a powerful executive or government official “satisfying their intellectual curiosity” in front of their computer, in ...

Protect against Wannacry with help from this free course

Protect against Wannacry with help from this free course

Friday, May 19, 2017 by

Alison has released a new course to teach people about the recent WannaCry global virus threat.The “WannaCry” computer virus infected thousands of computers worldwide this past weekend. (May 12th 2017). A “Trojan Horse” virus, it maliciously gains access to computer systems, locking down and making inaccessible to you and others your private information and data, then r...

The Netflix hack: A chat about securing your company

The Netflix hack: A chat about securing your company

Wednesday, May 10, 2017 by

As the digital transformation progresses onwards, the unfortunate side effects are becoming blatantly obvious in the news. It seems like every other day that some new big box company, political party, or individual has their information compromised. But even though only the few biggest companies get the real media attention, hundreds of millions of hacking attempts are ...

Improve mobile app security by turning it into code

Improve mobile app security by turning it into code

Monday, May 08, 2017 by

Why is application security such a pain? One of the hard problems with application security is that there are a zillion different ways that things can go wrong. Far more than any one person can be expert in. It's unfair to think that a software developer, who is already supposed to be expert in all the latest software languages, frameworks and best practices, should als...

NoTrove threat is delivering millions of scam ads

NoTrove threat is delivering millions of scam ads

Friday, April 28, 2017 by

Earlier this year, RiskIQ, a digital threat management company, reported an eight-fold increase in internet scam incidents that deny the $83 billion digital advertising industry millions of dollars. Now, researchers at RiskIQ have identified NoTrove, a newly discovered and major threat actor that is delivering millions of scam ads that threaten consumers and further und...

VPNs will not protect your privacy but this might

VPNs will not protect your privacy but this might

Monday, April 10, 2017 by

Editors note: Guest submission by Shaun Murphy, CEO of sndrCongress repealed FCC privacy regulations, set by Obama’s administration, that required Internet Service Provider’s (ISP’s) to obtain affirmative consent from customers before storing and using personal data for any purpose. This revelation has raised privacy concerns among consumers, and has sparked a debate of...

Intel security becomes McAfee

Intel security becomes McAfee

Tuesday, April 04, 2017 by

McAfee has begun operating as a new standalone company. Built on the belief that “Together is Power,” the new McAfee will expand upon its leading security solutions platform to better enable customers to effectively identify and orchestrate responses to cyber-threats. The launch of McAfee marks the closing of the previously announced investment by TPG and Inte...

How companies can keep their remote teams safe

How companies can keep their remote teams safe

Monday, April 03, 2017 by

If you hate bringing your work home with you, spare a thought for the 3.7 million Americans for whom home is the workplace.The telecommuter population is growing faster than the overall employee base, according to Global Workplace Analytics, and with half of all jobs deemed suitable for performing from home, it is a trend that is set to go on growing. Already, around a ...

Intent-based mobile app security: It's harder than you think

Intent-based mobile app security: It's harder than you think

Thursday, March 23, 2017 by

Recently, intent-based security has become a buzzword and a commonly used phrase in the developer community. However, this new wave of security is much more than just a catchphrase. The concept of intent-based security adds a new level of protection to applications in containerized environments, specifically by understanding what the app is intended to do and looking fo...

Next Page >>Last >>     

Subscribe to App Developer Daily

Latest headlines delivered to you daily.