Developers and brands must make mobile apps far more secure
Tuesday, January 17, 2023 by Christian Hargrave
The bad guys are still breaking digital windows and kicking down digital doors, so to speak, and will continue well into 2023 and beyond!
Consumers through experience or gut instinct will demand that their mobile app providers deliver key security features including trying to stop the increasingly prevalent "man-in-the-middle" attacks. The latest techn...
Hacking phones worry us the most
Thursday, July 14, 2022 by Freeman Lightner
Search results for 'smart appliances' have increased by 300% as people are becoming reliant on devices that promise to make their life easier.
Alarmingly, a recent report by Which revealed that a home with smart gadgets could be vulnerable to 12,000 hacking attacks in a single week.
Intrigued by this, BespokeSoftwareSolutions utilized the online analy...
Zero trust framework no longer optional 2021 predictions
Tuesday, January 12, 2021 by Brittany Hainzinger
There’s no doubt that COVID-19 and the shift to remote work have accelerated Zero Trust adoption in the enterprise. In 2021 and the following years, implementing a Zero Trust approach will become essential to protecting every enterprise, regardless of industry. This is due to the increasing volume of cyberthreats that organizations and individuals face on a regula...
How to avoid mobile phone apps from leaking your personal data
Wednesday, November 18, 2020 by Brittany Hainzinger
Most people have dozens of mobile phone apps installed on their phone, tablet, or even their smartwatch. In fact, the average person has about 60 to 90 mobile phone apps on their phone. Out of all those apps, many of them could be leaking your personal data. How can you protect yourself? One of the primary ways is by installing a VPN, but there are other ways, too. Here...
Your tech job just laid you off. Now what
Wednesday, June 10, 2020 by Matt Martin
Between March 11th and May 31st more than 600 startups have let nearly 60,000 employees go, according to Layoffs.fyi. If you’re among those, my sincere condolences. This guide should help you avoid some common pitfalls and help you get back on your feet as quickly as possible.
If you’re still employed, now is a good time to get a game-plan together for wh...
Microsoft DART team tracks 77k active web shells
Thursday, February 6, 2020 by Brittany Hainzinger
In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers.
According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...
Ethics standards and security protocols app developers should follow
Monday, September 30, 2019 by Richard Harris
Best buy discontinuing mobile platform for smart home devices
Monday, September 9, 2019 by Richard Harris
Best Buy has announced it is discontinuing its mobile app platform for controlling its Insignia brand of smart home devices. Some of the products include its Insignia smart wall plugs, Wi-Fi light switches, smart camera, and its Wi-Fi freezer.
Chris Olson, CEO of The Media TrustIn the post GDPR world, operating an app, not to mention a smart home platform, will be co...
Preview for Blockstack's new smartcontracting language
Tuesday, July 2, 2019 by Richard Harris
Blockstack PBC has released the first preview for its new smart contracting language, Clarity, ahead of its official launch later this year. The new language is designed to empower developers to create reliable smart contracts that reduce the risk of fatal flaws and bugs, which have resulted in well-publicized hacks and widespread damage, prior to launching applications...
Join us for a free mobile app security threats webinar on Tuesday
Friday, December 7, 2018 by Richard Harris
In 2016, a record 3 billion Yahoo accounts were hacked, and Uber reported that hackers stole the information of over 57 million accounts. Then in 2017, 412 million user accounts were taken from Friendfinder’s sites, and 147.9 million consumers were affected by the Equifax Breach. In 2018, Under Armor said that that it's My Fitness Pal app was hacked, affecting...
Sensor network data integrity gets help from a new blockchain solution
Wednesday, November 21, 2018 by Christian Hargrave
Sixgill, LLC unveiled its new breakthrough blockchain or distributed ledger-based solution for sensor network data integrity. Sixgill Integrity is a ledger-agnostic solution and is designed from the ground up to solve the fundamental need for an end-to-end, real-time sensor data authenticity system. With Integrity, organizations are assured that their emitted data, tran...
Single Page Application security help
Tuesday, October 23, 2018 by Richard Harris
Single-page applications, or SPAs, are web apps that load a single HTML page and dynamically update that page as the user interacts with the app. Their origins are unclear but the concept was discussed as early as 2003 according to the archives on Wiki. SPAs use AJAX and HTML5 to create fluid and responsive Web apps, without constant page reloads - that literally means,...
DuckDuckGo vs. Google vs. Privacy
Friday, October 19, 2018 by Richard Harris
Online privacy is becoming harder to find - Facebook gathers users’ data to sell to third parties, Google tracks everyone’s searches, ISPs in many countries gather communication data, and governments are increasingly demanding backdoor access to encrypted devices. In the latest news, Google exposed the data of 500,000 Google+ users and didn’t...
CEO Roundtable participants announced for Telecom Exchange NYC 2018
Wednesday, May 9, 2018 by Christian Hargrave
Jaymie Scotto & Associates (JSA), founder and host of the C-Level networking event series, the Telecom Exchange (TEX), announced its CEO Roundtable participants and topics for its 2018 TEX NYC event, taking place June 19-20 in Hoboken, NJ. The event will feature four CEO Roundtables, providing a major platform for tech, telecom and content thought leaders to deliber...
Overcoming IoT security threats to achieve better ROI
Monday, January 8, 2018 by Richard Harris
With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...
How to protect IP communications from telecom fraud
Thursday, December 28, 2017 by William King
Software-based IP communications continue to grow in popularity because of the added reliability, reach and control they allow businesses to have over their telecom resources. However, as more developers continue to transfer enterprise communications from legacy telcos to cloud-based service providers, the threat of telecom fraud and cyber-attacks also rise. Accord...
NXP releases their HomeKit SDK for Apple IoT
Tuesday, November 7, 2017 by Richard Harris
NXP Semiconductors announced that its Apple HomeKit Software Development Kit (SDK) offers full support for home automation applications using HomeKit, delivering exceptional performance, advanced security, while supporting all connectivity options, including BLE, Wi-Fi, Ethernet, and remote access over iCloud.HomeKit is a framework in iOS that lets accessories connect s...
The battle of biometric security coming in 2018
Friday, November 3, 2017 by Kevin Tussy
Fingerprint sensors first appeared in smart devices in 2007 and then gained momentum as a 4-digit PIN code replacement in 2013's Apple iPhone 5S. Hailed as the future of authentication by some, fingerprint's security weaknesses were quickly exposed by the children of sleepy dads, cats' paws and gummy bears. Still, the lure of convenience today and the promise of securit...
The Gates Foundation chats about Mojaloop
Wednesday, November 1, 2017 by Richard Harris
The Bill & Melinda Gates Foundation has released new open-source software for creating payment platforms that will help unbanked people around the world access digital financial services. The software, called Mojaloop, establishes a blueprint for connecting today’s financial services sector and can be used to overcome the barriers to interoperability that banks and ...
Flexera issues warning about Cyberattacks
Tuesday, October 24, 2017 by Christian Hargrave
As 143 million Equifax consumers continue to pick up the pieces from stolen Social Security numbers, birth dates, drivers’ licenses, addresses and credit card numbers, Flexera has another warning - expect a long tail of incidents and breaches in the months and years to come.Flexera surveyed over 400 software suppliers, Internet of Things (IoT) manufacturers and in-house...
IoT Cybersecurity is top concern says BlackBerry report
Friday, October 20, 2017 by Richard Harris
BlackBerry Limited has announced findings from a new global research whitepaper, which surveyed IT decision makers on corporate IoT deployments. Conducted by 451 Research, the whitepaper titled, “Securing the Enterprise of Things: Opportunity for securing IoT with a unified platform emerging as IoT popularity grows,” reveals that huge opportunities are balanced against ...
Sending out an S.O.S. for SMS
Wednesday, October 4, 2017 by Will LaSala
What a difference a year makes. Just one year after the National Institute of Standards and Technology issued guidance that found SMS is insecure and no longer suitable as a strong authentication mechanism, it has walked all of that back.At the time the original draft was published, it was highly unusual for any US government agency to get out in front of the security i...
Behavioral and biometric mobile authentication will end passwords
Friday, September 15, 2017 by David Vergara
You can say this about passwords: they're incredibly resilient. Not in a bulletproof kind of way but, more precisely, in terms of how long they've been around. According to Robert Svensson in his book "From Hacking to Report Writing: An Introduction to Security and Penetration," the first computer system to use passwords was built by researchers at the Massachusetts Ins...
Veracode announced two new key integrations
Friday, August 11, 2017 by Christian Hargrave
Veracode, a software security company acquired by CA Technologies, has announced the Veracode HPE Application Lifecycle Manager (ALM) Flaw Synchronizer Plug-in, which empowers development and QA/release engineers to fix security vulnerabilities early in the Software Development Lifecycle (SDLC). The company also announced an enhanced integration to the Veracode Applicat...
Developers are most wary of these technologies being hacked
Wednesday, August 2, 2017 by Christian Hargrave
In a new survey by Netsparker Ltd., a provider of web applications security, developers agreed that the government and financial services are the two sectors most vulnerable to hacking and that smart home IoT is the most vulnerable technology.Propeller Insights conducted the recent survey of U.S.-based software developers for Netsparker from July 5-7, 2017.Government mo...
VPNs will not protect your privacy but this might
Monday, April 10, 2017 by Richard Harris
Editors note: Guest submission by Shaun Murphy, CEO of sndrCongress repealed FCC privacy regulations, set by Obama’s administration, that required Internet Service Provider’s (ISP’s) to obtain affirmative consent from customers before storing and using personal data for any purpose. This revelation has raised privacy concerns among consumers, and has sparked a debate of...
LogDog now lets you protect your Slack and LinkedIn accounts too
Tuesday, December 13, 2016 by Christian Hargrave
LogDog, an app that is guarding user's online accounts against hacking, announces the addition of Slack and LinkedIn protection to its Android app. LogDog alerts users as soon as there's any suspicious activity on their online accounts, as they occur, providing valuable information for users to mitigate the threat.Just how real of an imminent threat is professional acco...
New Security Report 2016 shows 64 percent of millennials experienced a comprised account hack
Thursday, November 17, 2016 by Richard Harris
TeleSign has released its Consumer Account Security Report 2016, providing insight into consumer sentiments on online security and the value they place on their digital lives. Of the 1,300 U.S. consumers surveyed, nearly a third report the value of their online life at $100,000 to priceless. Further, more than half of the respondents surveyed (55 percent) place the onus...
The Impact of BYOD on Developers
Friday, July 1, 2016 by Mitch Black
From Security Research Labs breaking into a phone within seconds on 60 Minutes earlier this year to the Apple/FBI debacle, it’s increasingly clear that enterprises have varying levels of device security protocols in place. Surprisingly, the responsibility of ensuring vital data remains secure, especially as BYOD policies and a mobile-first workforce become the norm...
A Developer's Perspective on Mobile Security in the Age of BYOD
Thursday, March 31, 2016 by Joe Schulz
With the cost savings of BYOD continuing to lure organizations to adopt this approach, the number of companies allowing employee-owned devices is still on the rise, as well. In early 2015, Tech Pro Research announced that 74 percent of organizations either already allow or were planning to allow employees to bring their own devices to work. At the time of this writing, ...
Inversoft CEO Brian Pontarelli Discusses New Passport SSO User Management Platform
Friday, December 11, 2015 by Richard Harris
We recently visited with Inversoft CEO Brian Pontarelli to talk about his company’s new Passport single sign on (SSO) user management solution that goes beyond standard single sign-on to support messaging in the user’s localized language, built-in analytics, and the ability to discipline/reward users (e.g. mute, ban, suspend, reward) based on activity.Brian is the found...
An Analysis of the Starbucks Cyber Attack and How To Stay Protected
Wednesday, June 10, 2015 by Amit Ashbel
How much is a cup of coffee really worth? Several weeks ago, many Starbucks customers began reporting their Starbucks card balance emptied and then topped again. On May 13th, Starbucks released a written statement denying the un-authorized activity was a result of a hack or an intrusion to its servers or mobile app. But the hard facts show that indeed customers ha...
Game Developers Have a Bright Future With Google Glass
Friday, April 25, 2014 by Stuart Parkerson
Game developers should keep a close eye (pun intended) on Google Glass and its potential to create immersive games. As Google points out, “With tons of tiny sensors and a screen that fits neatly above the eye, Glass is an exciting new place to play.”There are plenty of examples of Augmented Reality devices (we reported on several during GDC) but they tend to be bulky, s...
Guide: Using Facebook To Get App Installs
Friday, April 4, 2014 by Artyom Dogtiev
marketing plan is a crucial step in app development. There are several types of
advertising/influence making that go into a good marketing mix - media buying,
a strong press release, traffic generation, media coverage and social media
become the platform that allows a single solution, combining social media
marketing and tr...
Leaky Apps: A New Era of Expectations
Monday, March 3, 2014 by Max Howell
long string of revelations about the NSA’s spying tactics divulged by Edward
Snowden, is the fact that “leaky” mobile apps such as Angry Birds make a lot
more information accessible than users might want to share, such as their age,
gender and location.
the smartphone app explosion of the last few years, it's not surprising to find