First multiTEE security platform for mobile app developers emerges
Tuesday, March 5, 2019 by Christian Hargrave
Trustonic says it will expand support to include Huawei’s Trusted Execution Environment (TEE) on its mobile application security platform, Trustonic Application Protection (TAP). Until now, TAP has enabled app developers to build apps secured by both strong application shielding for iOS and Android, and hardware-based protection for the 1.7 billion Android devices...
5 app development tips to help you avoid disaster
Wednesday, November 28, 2018 by Joe Hanson
Mobile app development: it’s easy and straightforward in the lab, but once your app is deployed to the wild, all bets are off. You need to deliver seamless, fast experiences for users on low-powered devices, in any number of network environments.
When it comes to building mobile apps, uncontrollable user behavior can lead you down the path to death by 1000 pape...
30,000 blacklisted apps hosted on the Google Play Store report finds
Friday, September 21, 2018 by Richard Harris
RiskIQ has released its Mobile Threat Landscape Q2 2018 Report, which analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings show a spike in blacklisted apps headlined by Trojans and Adware, as well as a fascinating shift in tactics by mobile threat actors.
For the second year in a row, RiskIQ observed a sharp increase in black...
Detect eavesdropping in your mobile app with TrustKit
Wednesday, July 11, 2018 by Christian Hargrave
Data Theorem, Inc. announced the availability of TrustKit Analytics, a new service for the TrustKit community that delivers advanced security insights. In addition, the company announced that since TrustKit’s release in 2015, it has identified more than 100 million eavesdropping attempts on iOS and Android applications, where apps in active mode have blocked 100 p...
Mobile Threat Landscape reports steady decrease in blacklisted apps
Friday, June 1, 2018 by Christian Hargrave
RiskIQ has released its Mobile Threat Landscape Q1 2018 Report, which analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings showed that taking advantage of the popularity and volatility of the cryptocurrency landscape is paying off for threat actors via the mobile attack vector and that malicious apps leveraged by nation-state ac...
Enterprise threat dubbed HospitalGown infests thousands of apps
Tuesday, June 6, 2017 by Richard Harris
Appthority, an enterprise mobile threat protection company, published research on a newly discovered backend data exposure vulnerability, dubbed HospitalGown, that highlights the connection between mobile apps and insecure backend databases containing enterprise data. Appthority documented more than 1,000 apps with this vulnerability, and researched in detail 39 applica...
Enterprise Mobile Threat Update for Q3 2016 Arrives
Thursday, August 11, 2016 by Richard Harris
Appthority has released it Enterprise Mobile Threat Update for Q3 2016, which provides insight into the mobile threat landscape over the last quarter.Appthority’s Enterprise Mobile Threat Team monitors and researches the latest mobile risks that are direct threats to the enterprise. The data is compiled into the quarterly Enterprise Mobile Threat Update, aimed at provid...
AdaptiveMobile Adds SS7 Cat 3 Detection Capabilities to Mobile Threat Intelligence Platform
Wednesday, June 29, 2016 by Richard Harris
AdaptiveMobile has announced advanced SS7 “Cat 3” Signalling Protection detection capabilities to its Mobile Threat Intelligence Platform including Network Memory, Location Plausibility, and Remote Intercept. The Company’s advanced threat detection is based on continuous data and analysis with all rules validated with information from across five continents. Adapt...
Security Brief Protecting Against the OWASP Mobile Top 10
Thursday, January 7, 2016 by Stuart Parkerson
There are over 1.6 million Android apps in the Google Play store. Over 1.5 million apps are in the Apple App Store. For mobile app hackers, today’s mobile environment has never offered a more fertile landscape to phish for user information or implant mobile malware. And never in history has more information been available to exploit.To understand how mobile application ...