hacked

hacked news search results

Developer news items we found relating to hacked

35 results
Zero-trust-framework-no-longer-optional-2021-predictions

Zero trust framework no longer optional 2021 predictions


Tuesday, January 12, 2021 by

There’s no doubt that COVID-19 and the shift to remote work have accelerated Zero Trust adoption in the enterprise. In 2021 and the following years, implementing a Zero Trust approach will become essential to protecting every enterprise, regardless of industry. This is due to the increasing volume of cyberthreats that organizations and individuals face on a regula...


How-to-avoid-mobile-phone-apps-from-leaking-your-personal-data

How to avoid mobile phone apps from leaking your personal data


Wednesday, November 18, 2020 by

Most people have dozens of mobile phone apps installed on their phone, tablet, or even their smartwatch. In fact, the average person has about 60 to 90 mobile phone apps on their phone. Out of all those apps, many of them could be leaking your personal data. How can you protect yourself? One of the primary ways is by installing a VPN, but there are other ways, too. Here...


Your-tech-job-just-laid-you-off.-Now-what

Your tech job just laid you off. Now what


Wednesday, June 10, 2020 by

Between March 11th and May 31st more than 600 startups have let nearly 60,000 employees go, according to Layoffs.fyi. If you’re among those, my sincere condolences. This guide should help you avoid some common pitfalls and help you get back on your feet as quickly as possible. If you’re still employed, now is a good time to get a game-plan together for wh...


Microsoft-DART-team-tracks-77k-active-web-shells

Microsoft DART team tracks 77k active web shells


Thursday, February 6, 2020 by

In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers. According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...


Ethics-standards-and-security-protocols-app-developers-should-follow

Ethics standards and security protocols app developers should follow


Monday, September 30, 2019 by

Consumers put a lot of trust in app developers. Sacrificing data for convenience isn't a new concept - FaceApp is only the most recent example of the low bar set for allowing our private data into the hands of any company that pushes out an app. Yet, even after so many breaches and all-encompassing terms of use, why aren't more developers doing more to advocate ...


Best-buy-discontinuing-mobile-platform-for-smart-home-devices-

Best buy discontinuing mobile platform for smart home devices


Monday, September 9, 2019 by

Best Buy has announced it is discontinuing its mobile app platform for controlling its Insignia brand of smart home devices. Some of the products include its Insignia smart wall plugs, Wi-Fi light switches, smart camera, and its Wi-Fi freezer. Chris Olson, CEO of The Media TrustIn the post GDPR world, operating an app, not to mention a smart home platform, will be co...


Preview-for-Blockstack

Preview for Blockstack's new smartcontracting language


Tuesday, July 2, 2019 by

Blockstack PBC has released the first preview for its new smart contracting language, Clarity, ahead of its official launch later this year. The new language is designed to empower developers to create reliable smart contracts that reduce the risk of fatal flaws and bugs, which have resulted in well-publicized hacks and widespread damage, prior to launching applications...


Join-us-for-a-free-mobile-app-security-threats-webinar-on-Tuesday

Join us for a free mobile app security threats webinar on Tuesday


Friday, December 7, 2018 by

In 2016, a record 3 billion Yahoo accounts were hacked, and Uber reported that hackers stole the information of over 57 million accounts. Then in 2017, 412 million user accounts were taken from Friendfinder’s sites, and 147.9 million consumers were affected by the Equifax Breach. In 2018, Under Armor said that that it's My Fitness Pal app was hacked, affecting...


Sensor-network-data-integrity-gets-help-from-a-new-blockchain-solution

Sensor network data integrity gets help from a new blockchain solution


Wednesday, November 21, 2018 by

Sixgill, LLC unveiled its new breakthrough blockchain or distributed ledger-based solution for sensor network data integrity. Sixgill Integrity is a ledger-agnostic solution and is designed from the ground up to solve the fundamental need for an end-to-end, real-time sensor data authenticity system. With Integrity, organizations are assured that their emitted data, tran...


Single-Page-Application-security-help

Single Page Application security help


Tuesday, October 23, 2018 by

Single-page applications, or SPAs, are web apps that load a single HTML page and dynamically update that page as the user interacts with the app. Their origins are unclear but the concept was discussed as early as 2003 according to the archives on Wiki. SPAs use AJAX and HTML5 to create fluid and responsive Web apps, without constant page reloads - that literally means,...


DuckDuckGo-vs.-Google-vs.-Privacy

DuckDuckGo vs. Google vs. Privacy


Friday, October 19, 2018 by

Online privacy is becoming harder to find - Facebook gathers users’ data to sell to third parties, Google tracks everyone’s searches, ISPs in many countries gather communication data, and governments are increasingly demanding backdoor access to encrypted devices. In the latest news, Google exposed the data of 500,000 Google+ users and didn’t...


CEO-Roundtable-participants-announced-for-Telecom-Exchange-NYC-2018

CEO Roundtable participants announced for Telecom Exchange NYC 2018


Wednesday, May 9, 2018 by

Jaymie Scotto & Associates (JSA), founder and host of the C-Level networking event series, the Telecom Exchange (TEX), announced its CEO Roundtable participants and topics for its 2018 TEX NYC event, taking place June 19-20 in Hoboken, NJ. The event will feature four CEO Roundtables, providing a major platform for tech, telecom and content thought leaders to deliber...


Overcoming-IoT-security-threats-to-achieve-better-ROI

Overcoming IoT security threats to achieve better ROI


Monday, January 8, 2018 by

With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...


How-to-protect-IP-communications-from-telecom-fraud

How to protect IP communications from telecom fraud


Thursday, December 28, 2017 by

Software-based IP communications continue to grow in popularity because of the added reliability, reach and control they allow businesses to have over their telecom resources. However, as more developers continue to transfer enterprise communications from legacy telcos to cloud-based service providers, the threat of telecom fraud and cyber-attacks also rise. Accord...


NXP-releases-their-HomeKit-SDK-for-Apple-IoT

NXP releases their HomeKit SDK for Apple IoT


Tuesday, November 7, 2017 by

NXP Semiconductors announced that its Apple HomeKit Software Development Kit (SDK) offers full support for home automation applications using HomeKit, delivering exceptional performance, advanced security, while supporting all connectivity options, including BLE, Wi-Fi, Ethernet, and remote access over iCloud.HomeKit is a framework in iOS that lets accessories connect s...


The-battle-of-biometric-security-coming-in-2018

The battle of biometric security coming in 2018


Friday, November 3, 2017 by

Fingerprint sensors first appeared in smart devices in 2007 and then gained momentum as a 4-digit PIN code replacement in 2013's Apple iPhone 5S. Hailed as the future of authentication by some, fingerprint's security weaknesses were quickly exposed by the children of sleepy dads, cats' paws and gummy bears. Still, the lure of convenience today and the promise of securit...


The-Gates-Foundation-chats-about-Mojaloop

The Gates Foundation chats about Mojaloop


Wednesday, November 1, 2017 by

The Bill & Melinda Gates Foundation has released new open-source software for creating payment platforms that will help unbanked people around the world access digital financial services. The software, called Mojaloop, establishes a blueprint for connecting today’s financial services sector and can be used to overcome the barriers to interoperability that banks and ...


Flexera-issues-warning-about-Cyberattacks

Flexera issues warning about Cyberattacks


Tuesday, October 24, 2017 by

As 143 million Equifax consumers continue to pick up the pieces from stolen Social Security numbers, birth dates, drivers’ licenses, addresses and credit card numbers, Flexera has another warning - expect a long tail of incidents and breaches in the months and years to come.Flexera surveyed over 400 software suppliers, Internet of Things (IoT) manufacturers and in-house...


IoT-Cybersecurity-is-top-concern-says-BlackBerry-report

IoT Cybersecurity is top concern says BlackBerry report


Friday, October 20, 2017 by

BlackBerry Limited has announced findings from a new global research whitepaper, which surveyed IT decision makers on corporate IoT deployments. Conducted by 451 Research, the whitepaper titled, “Securing the Enterprise of Things: Opportunity for securing IoT with a unified platform emerging as IoT popularity grows,” reveals that huge opportunities are balanced against ...


Sending-out-an-S.O.S.-for-SMS

Sending out an S.O.S. for SMS


Wednesday, October 4, 2017 by

What a difference a year makes. Just one year after the National Institute of Standards and Technology issued guidance that found SMS is insecure and no longer suitable as a strong authentication mechanism, it has walked all of that back.At the time the original draft was published, it was highly unusual for any US government agency to get out in front of the security i...


Behavioral-and-biometric-mobile-authentication-will-end-passwords

Behavioral and biometric mobile authentication will end passwords


Friday, September 15, 2017 by

You can say this about passwords: they're incredibly resilient. Not in a bulletproof kind of way but, more precisely, in terms of how long they've been around. According to Robert Svensson in his book "From Hacking to Report Writing: An Introduction to Security and Penetration," the first computer system to use passwords was built by researchers at the Massachusetts Ins...


Veracode-announced-two-new-key-integrations

Veracode announced two new key integrations


Friday, August 11, 2017 by

Veracode, a software security company acquired by CA Technologies, has announced the Veracode HPE Application Lifecycle Manager (ALM) Flaw Synchronizer Plug-in, which empowers development and QA/release engineers to fix security vulnerabilities early in the Software Development Lifecycle (SDLC). The company also announced an enhanced integration to the Veracode Applicat...


Developers-are-most-wary-of-these-technologies-being-hacked

Developers are most wary of these technologies being hacked


Wednesday, August 2, 2017 by

In a new survey by Netsparker Ltd., a provider of web applications security, developers agreed that the government and financial services are the two sectors most vulnerable to hacking and that smart home IoT is the most vulnerable technology.Propeller Insights conducted the recent survey of U.S.-based software developers for Netsparker from July 5-7, 2017.Government mo...


VPNs-will-not-protect-your-privacy-but-this-might

VPNs will not protect your privacy but this might


Monday, April 10, 2017 by

Editors note: Guest submission by Shaun Murphy, CEO of sndrCongress repealed FCC privacy regulations, set by Obama’s administration, that required Internet Service Provider’s (ISP’s) to obtain affirmative consent from customers before storing and using personal data for any purpose. This revelation has raised privacy concerns among consumers, and has sparked a debate of...


LogDog-now-lets-you-protect-your-Slack-and-LinkedIn-accounts-too

LogDog now lets you protect your Slack and LinkedIn accounts too


Tuesday, December 13, 2016 by

LogDog, an app that is guarding user's online accounts against hacking, announces the addition of Slack and LinkedIn protection to its Android app. LogDog alerts users as soon as there's any suspicious activity on their online accounts, as they occur, providing valuable information for users to mitigate the threat.Just how real of an imminent threat is professional acco...


New-Security-Report-2016-shows-64-percent-of-millennials-experienced-a-comprised-account-hack

New Security Report 2016 shows 64 percent of millennials experienced a comprised account hack


Thursday, November 17, 2016 by

TeleSign has released its Consumer Account Security Report 2016, providing insight into consumer sentiments on online security and the value they place on their digital lives. Of the 1,300 U.S. consumers surveyed, nearly a third report the value of their online life at $100,000 to priceless. Further, more than half of the respondents surveyed (55 percent) place the onus...


The-Impact-of-BYOD-on-Developers

The Impact of BYOD on Developers


Friday, July 1, 2016 by

From Security Research Labs breaking into a phone within seconds on 60 Minutes earlier this year to the Apple/FBI debacle, it’s increasingly clear that enterprises have varying levels of device security protocols in place. Surprisingly, the responsibility of ensuring vital data remains secure, especially as BYOD policies and a mobile-first workforce become the norm...


A-Developer

A Developer's Perspective on Mobile Security in the Age of BYOD


Thursday, March 31, 2016 by

With the cost savings of BYOD continuing to lure organizations to adopt this approach, the number of companies allowing employee-owned devices is still on the rise, as well. In early 2015, Tech Pro Research announced that 74 percent of organizations either already allow or were planning to allow employees to bring their own devices to work. At the time of this writing, ...


Inversoft-CEO-Brian-Pontarelli-Discusses-New-Passport-SSO-User-Management-Platform

Inversoft CEO Brian Pontarelli Discusses New Passport SSO User Management Platform


Friday, December 11, 2015 by

We recently visited with Inversoft CEO Brian Pontarelli to talk about his company’s new Passport single sign on (SSO) user management solution that goes beyond standard single sign-on to support messaging in the user’s localized language, built-in analytics, and the ability to discipline/reward users (e.g. mute, ban, suspend, reward) based on activity.Brian is the found...


An-Analysis-of-the-Starbucks-Cyber-Attack-and-How-To-Stay-Protected

An Analysis of the Starbucks Cyber Attack and How To Stay Protected


Wednesday, June 10, 2015 by

How much is a cup of coffee really worth? Several weeks ago, many Starbucks customers began reporting their Starbucks card balance emptied and then topped again. On May 13th, Starbucks released a written statement  denying the un-authorized activity was a result of a hack or an intrusion to its servers or mobile app. But the hard facts show that indeed customers ha...


Game-Developers-Have-a-Bright-Future-With-Google-Glass

Game Developers Have a Bright Future With Google Glass


Friday, April 25, 2014 by

Game developers should keep a close eye (pun intended) on Google Glass and its potential to create immersive games. As Google points out, “With tons of tiny sensors and a screen that fits neatly above the eye, Glass is an exciting new place to play.”There are plenty of examples of Augmented Reality devices (we reported on several during GDC) but they tend to be bulky, s...


Guide:-Using-Facebook-To-Get-App-Installs

Guide: Using Facebook To Get App Installs


Friday, April 4, 2014 by

Writing a marketing plan is a crucial step in app development. There are several types of advertising/influence making that go into a good marketing mix - media buying, a strong press release, traffic generation, media coverage and social media exposure. Facebook has become the platform that allows a single solution, combining social media marketing and tr...


Leaky-Apps:-A-New-Era-of-Expectations

Leaky Apps: A New Era of Expectations


Monday, March 3, 2014 by

Among the long string of revelations about the NSA’s spying tactics divulged by Edward Snowden, is the fact that “leaky” mobile apps such as Angry Birds make a lot more information accessible than users might want to share, such as their age, gender and location. Considering the smartphone app explosion of the last few years, it's not surprising to find our liv...


App Developers: How to Protect Your Apps From Being Hacked in 2014


Wednesday, January 15, 2014 by

With 2013 behind us we are left with the memory of a massive increase and change in cyber criminal behavior, as well as some foresight into 2014 and the things developers can do to protect applications from hacking. As the Internet of Things (IoT) creates more situations where our daily lives, our governments, our utilities, our homes, and our businesses can be m...


App-Developers-Conference-Survey-Finds-Piracy-and-Discoverability-are-Big-Problems

App Developers Conference Survey Finds Piracy and Discoverability are Big Problems


Monday, September 30, 2013 by

Piracy and discoverability are the top issues facing app developers today, according to new research conducted by the organizers of the inaugural App Developers Conference (ADC). In order to paint a picture of the app development landscape as it stands right before ADC, more than 250 app creators were surveyed on topics ranging from targeted platforms and app stores to...