hack

hack magazine search results

App Developer Magazine issues we found relating to hack


Feb14 Issue: How to Protect Your Apps From Hacking

Get advice on how to target your push alerts, use social media to promote your app for free, API monetization, learn about CES 2014, get the top things for entrepreneurs to know about mobile app development, where profits are hiding in the app store, and loads more!

hack news search results

Developer news items we found relating to hack

35 results
Cardano-gets-largest-upgrade-in-5-years

Cardano gets largest upgrade in 5 years


Wednesday, October 19, 2022 by

The research and software development company behind Cardano, Input Output Global (IOG), has confirmed that it had last night, along with the Cardano Foundation technical team, successfully applied the much-anticipated ‘Vasil’ upgrade to the Cardano mainnet. The upgrade is set to bring increased network capacity, richer applications, and faster transactions ...


How-eSIM-iPhone-14-could-be-a-disaster-for-unprepared-carriers

How eSIM iPhone 14 could be a disaster for unprepared carriers


Monday, September 12, 2022 by

The news that Apple has launched an eSIM-only iPhone 14 model in the US is an eSIM turning point in the mobile carrier industry, essentially signaling the start of a new era of digital connectivity competition, says GlobalData. According to the leading data and analytics company, the consequences are many and varied, as the eSIM-only smartphone model represents myria...


Decentralized-wallets-suggested-after-Solana-hack

Decentralized wallets suggested after Solana hack


Wednesday, August 17, 2022 by

The recent hack on the Solana cryptocurrency wallet has led to a drain of millions of dollars, which raised concerns about the security of the crypto ecosystem. Against this backdrop, the volume of discussions around 'Solana' among Twitter influencers surged in the first week of August as most of them commended the use of decentralized or open source w...


Using-blockchain-to-grow-your-business

Using blockchain to grow your business


Tuesday, August 16, 2022 by

By now, almost everyone who spends time in the tech space knows that blockchain technology is having a moment. It is a digital technology that has gained prominence in recent years, especially concerning the cryptocurrency industry. How you could be using blockchain to grow your business Blockchain technology is not just for tech-savvy bitcoin traders, however. Th...


2021-hackathon-from-NEAR

2021 hackathon from NEAR


Friday, August 13, 2021 by

NEAR announced the first in a series of NEAR MetaBUIDL hackathons with $1 million in prizes until the end of the year. The first MetaBUIDL Hackathon runs from Aug 27 to Sep 12. Registration is open now. Speakers and Activities at the 2021 hackathon from NEAR They think it's a great opportunity for anyone interested in solving real-world problems that coul...


Security-concerns-will-be-front-and-center-in-2021

Security concerns will be front and center in 2021


Saturday, January 9, 2021 by

Security concerns, especially when it comes to cloud native applications, will be even more front and center in 2021 than they have been recently, said Linux Foundation SVP & General Manager of Training & Certification Clyde Seepersad. Recent research by The Linux Foundation and Harvard found that open source developers are not prioritizing security issu...


HackNotice-announces-threat-intelligence-platform

HackNotice announces threat intelligence platform


Friday, September 18, 2020 by

HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...


5-app-development-tips-to-help-you-avoid-disaster

5 app development tips to help you avoid disaster


Wednesday, November 28, 2018 by

Mobile app development: it’s easy and straightforward in the lab, but once your app is deployed to the wild, all bets are off. You need to deliver seamless, fast experiences for users on low-powered devices, in any number of network environments. When it comes to building mobile apps, uncontrollable user behavior can lead you down the path to death by 1000 pape...


Twitter-and-KaiOS-take-on-KaiOSpowered-smart-feature-phones

Twitter and KaiOS take on KaiOSpowered smart feature phones


Wednesday, November 21, 2018 by

Imagine you’re a seasoned designer for smartphones working with ever-expanding resources, including memory, CPU speed, and screen resolution. Then, one day, your manager gives you an assignment to work on a device that has less of all this and doesn’t even have a touchscreen! This is what happened to some of the designers at Twitter and KaiOS, all of whom...


DuckDuckGo-vs.-Google-vs.-Privacy

DuckDuckGo vs. Google vs. Privacy


Friday, October 19, 2018 by

Online privacy is becoming harder to find - Facebook gathers users’ data to sell to third parties, Google tracks everyone’s searches, ISPs in many countries gather communication data, and governments are increasingly demanding backdoor access to encrypted devices. In the latest news, Google exposed the data of 500,000 Google+ users and didn’t...


How-the-reddit-security-breach-reminds-us-to-be-careful

How the reddit security breach reminds us to be careful


Monday, August 6, 2018 by

reddit recently disclosed in their announcements feed of a security breach into their system which the hacker "managed to access some user data, including some current email addresses and a 2007 database backup containing old salted and hashed passwords." Include in the disclosed information was some reddit source code and some log files. They went on to sa...


How-Nintendo-proves-some-people-hate-the-app-stores

How Nintendo proves some people hate the app stores


Tuesday, May 29, 2018 by

When Nintendo announced that it’s bringing back the NES Classic console on June 29th my first thought was...why? It's a proven platform there's no doubt, but you can walk into any used video game store across the land and pickup the actual vintage console for around $100 bucks. Or just cruise Ebay and you'll find the console, controllers, 25 cartridge games, the zapper ...


The-software-fail-watch-report

The software fail watch report


Wednesday, January 31, 2018 by

Tricentis has announced the release of their fifth annual Software Fail Watch report, which is a detailed analysis of the software failures, defects, and vulnerabilities covered by news organizations from around the globe. Tricentis analyzed each failure to reveal industry-specific trends as well as impacts to stock prices, market share, and customer trust and loyalty. ...


US-Military-offers-BrainHQ-brain-training-to-all-personnel

US Military offers BrainHQ brain training to all personnel


Wednesday, January 24, 2018 by

In recognition of recent breakthroughs in brain science, every soldier, sailor, airman and marine in the US Armed Forces will now have access to computerized brain training and assessments from Posit Science, through its BrainHQ web, phone and tablet apps.Library distributor Demco Software made the arrangements with the US Department of Defense through the library syste...


Why-developers-must-be-blockchain-agnostic-for-decentralized-apps

Why developers must be blockchain agnostic for decentralized apps


Monday, December 4, 2017 by

It’s difficult to overemphasize how important blockchain technology will be to the world of app development over the next decade. While it’s clearly still an emerging technology, the fundamental shift that it will bring about in the foundations on which applications are built will be profound. Many developers have foreseen this change and are investigating how it might ...


Software-testing-considerations-for-voicefirst-applications

Software testing considerations for voicefirst applications


Saturday, December 2, 2017 by

The names Alexa and Echo are household names and someday soon, most people will have these devices in their homes, ordering takeout, picking out a song, answering trivia questions. Welcome to the voice-first applications era. Amazon and Google have sold millions of Amazon Alexa and Echo and Google Home devices and 24.5 million voice-first devices are expected to ship be...


Sending-out-an-S.O.S.-for-SMS

Sending out an S.O.S. for SMS


Wednesday, October 4, 2017 by

What a difference a year makes. Just one year after the National Institute of Standards and Technology issued guidance that found SMS is insecure and no longer suitable as a strong authentication mechanism, it has walked all of that back.At the time the original draft was published, it was highly unusual for any US government agency to get out in front of the security i...


Pythonpowered-machine-learning-with-Anaconda-and-MS-partnership

Pythonpowered machine learning with Anaconda and MS partnership


Monday, October 2, 2017 by

Anaconda, Inc. has announced it is partnering with Microsoft to embed Anaconda into Azure Machine Learning, Visual Studio and SQL Server to deliver data insights in real time. Microsoft and Anaconda will partner to deliver Anaconda for Microsoft, a subset of the Anaconda distribution available on Windows, MacOS and Linux. Anaconda, Inc. will also offer a range of suppor...


The-HBO-hack-reveals-how-vulnerable-data-is-to-black-hats

The HBO hack reveals how vulnerable data is to black hats


Thursday, August 31, 2017 by

The HBO hack is the latest in a string of high-profile hacks over the last two years (Dropbox, Yahoo!, UK Ministry of Health) where a handful of vulnerable servers were compromised and used to take down and steal information. Studies have shown the next year represent a turning point in the digitization of enterprise content. A recent Forrester study commissioned by Alf...


New-biometric-authentication-could-be-a-password-killer

New biometric authentication could be a password killer


Wednesday, July 12, 2017 by

Pramati Technologies has announced the ThumbSignIn biometric authentication SaaS platform for mobile and web applications and additionally its certification by the FIDO Alliance. The platform enables enterprises and service providers to deploy strong authentication solutions that reduce reliance on passwords and protect against phishing, man-in-the-middle, and replay at...


DocuSign-talks-about-embedding-eSigning-into-your-app

DocuSign talks about embedding eSigning into your app


Monday, June 12, 2017 by

DocuSign, an eSignature startup, has a reported $3 billion valuation, more than 100+ million users, and a client roster that includes Microsoft, Salesforce, LinkedIn and SAP. Here Marie Huwe, the VP of Developer Programs and Evangelism at DocuSign, tells us about their API and how developers have influenced their growth and success to date. ADM: What is your role at Doc...


Dashlane-to-utilize-Android

Dashlane to utilize Android's new support for password managers


Monday, May 29, 2017 by

Google announced native support for password managers in Android O and an early preview of Autofill with Google, which in the absence of a password manager, allows the user to use information from Chrome Sync and Google Payments to autofill apps. By offering basic functionality out-of-the-box and making it much easier for users to adopt and use a password management app...


Get-mobile-printing-up-and-running:-What-CIOs-need-to-know

Get mobile printing up and running: What CIOs need to know


Wednesday, May 24, 2017 by

Enterprise workplace infrastructure is changing. Gartner found that total mobile sales into the enterprise globally are greater than 200,000 per year, while PCs are half that. The PC installed base has been on a steady decline since 2014, while the mobile installed base is on the rise - meaning mobile is set to surpass the PC installed base in 2017.However, even as more...


A-DevOps-framework-for-federal-customers

A DevOps framework for federal customers


Wednesday, May 17, 2017 by

Last Thursday, President Trump signed an executive order designed to strengthen the cybersecurity of federal networks including moving all federal IT systems to the cloud. The executive order also calls for effective risk management, which includes requiring planning so that maintenance, improvements and modernization occur in a coordinated way and with appropriate regu...


The-Netflix-hack:-A-chat-about-securing-your-company

The Netflix hack: A chat about securing your company


Wednesday, May 10, 2017 by

As the digital transformation progresses onwards, the unfortunate side effects are becoming blatantly obvious in the news. It seems like every other day that some new big box company, political party, or individual has their information compromised. But even though only the few biggest companies get the real media attention, hundreds of millions of hacking attempts are ...


How-NGINX-could-overpower-Microsoft-soon

How NGINX could overpower Microsoft soon


Thursday, April 13, 2017 by

In 2016, NGINX experienced their largest gains as a web server vendor, having increased by 4.8 million active sites and 2.85 percentage points. Netcraft believes that if these trends continue in 2017, NGINX could possibly overtake Microsoft as the second largest vendor in the second half of the year.In a recent conversation with Faisal Memon, Product Marketing at NGINX,...


Taking-your-mobile-website-SEO-to-the-next-level

Taking your mobile website SEO to the next level


Wednesday, April 12, 2017 by

Editors note: Guest submission by Tom HardyWhy does SEO have to be such a moving target? As frustrating as it is, the changing landscape of telling web crawlers all about your website for discovery is always changing. From 2015 until now, there have been well over 50 unofficial changes to the "rules" that search engines look for on your website.A good mobile friend...


Wait,-the-CIA-can-comprimise-my-iPhone-or-Android

Wait, the CIA can comprimise my iPhone or Android


Tuesday, March 14, 2017 by

In the largest leak of C.I.A. documents, Wikileaks disclosed the tools that C.I.A. uses to hack computers, phones and smart TVs around the world. The C.I.A.’s ability to compromise Apple and Android smartphones is especially troubling, since spies can access private information through these devices, including photos, emails, texts and videos. Further, a program ca...


ApexBrasil-showcases-Brazil

ApexBrasil showcases Brazil's finest at SXSW


Friday, March 10, 2017 by

The Brazilian Trade and Investment Promotion Agency (Apex-Brasil) will showcase 68 of Brazil’s most exciting companies at the 2017 SXSW Interactive Festival. As part of its mission to bring the best of Brazil to the world’s global investors and trade fairs, Apex-Brasil will share the abundance of opportunities that exist in its vibrant ecosystem with attendees at SXSW I...


The-hackers-religion-of-open-source:-A-manifesto-(kind-of)

The hackers religion of open source: A manifesto (kind of)


Friday, January 27, 2017 by

Religion sucks. But people still need to believe in something to have motivation in life. Over the last 20 years, religions have reported incredible decreases in numbers. Many scholars attribute that to the growth of technology, connectivity and to the exposure it gives people to different religions. There are more people now that identity as “spiritual” than ever befor...


Privacy-will-be-the-name-of-the-game-in-2017-

Privacy will be the name of the game in 2017


Thursday, December 22, 2016 by

Editors note: 2017 predictions by Alan Duric, Co-Founder and CTO at Wire   2016 has seen a huge rise in machine learning and connected devices from Amazon Alexa and Google Assistant; to Apple CarPlay and Android Auto. The world has become truly connected but not without the growing pains that any emerging industry is bound to face.    In Dec...


Veris-Group-steps-up-it

Veris Group steps up it's advanced security game with Endgame


Friday, December 16, 2016 by

Endgame has announced that Veris Group's Adaptive Threat Division (ATD), a provider in adversary simulation and detection services, will utilize Endgame's endpoint detection and response platform to enhance detection, response, and threat hunting capabilities to eliminate security threats faster and with greater accuracy for customers.This partnership leverages Endgame'...


New-Security-Report-2016-shows-64-percent-of-millennials-experienced-a-comprised-account-hack

New Security Report 2016 shows 64 percent of millennials experienced a comprised account hack


Thursday, November 17, 2016 by

TeleSign has released its Consumer Account Security Report 2016, providing insight into consumer sentiments on online security and the value they place on their digital lives. Of the 1,300 U.S. consumers surveyed, nearly a third report the value of their online life at $100,000 to priceless. Further, more than half of the respondents surveyed (55 percent) place the onus...


Meet-Dav-Glass,-local-hero-hacker-and-Yahoo-Distinguished-Engineer

Meet Dav Glass, local hero hacker and Yahoo Distinguished Engineer


Thursday, November 10, 2016 by

Dav Glass is a Distinguished Architect for Yahoo, and has been at the company for 10 years. He works with various teams across Yahoo with their NodeJS applications and deployments, as well as other Open Source initiatives to help their developers give away and contribute to Open Source Software. Outside of Yahoo, he also coaches 3 robotics teams at a local High Sch...


Paving-the-way-to-smarter-phone-security

Paving the way to smarter phone security


Wednesday, October 19, 2016 by

75 million Smartphone users admit that while they are afraid of cyber attacks, they have not set a password for their smartphones according to the latest TransUnion’s Cyber Security Survey. While at first glance, this seems completely alarming and the ramifications could result in identity theft, it is also not surprising as consumers are not technologists and they just...