hacker

hacker news search results

Developer news items we found relating to hacker

35 results
NetLib-Security-predictions-2025

NetLib Security predictions 2025


Thursday, January 2, 2025 by

The leading prediction for 2025 will sound familiar: Generative AI directly affects your privacy rights. In many ways, this is a twist on the typical cybersecurity problem. Rather than a hacker or a bad actor breaking in to steal your data, we are being asked to hand our keys to the companies we often trust the most: Microsoft, Apple, Dropbox, and Google! NetLib Secu...


DevOps-threats-report-released-from-GitProtect-io

DevOps threats report released from GitProtect io


Monday, August 12, 2024 by

Outages, human errors, cyberattacks, data breaches, ransomware, security vulnerabilities, and, as a result, data loss are the reality that DevSecOps teams have to face...even every few days. The State of DevOps threats report - teams affected every few days GitProtect.io recently presented its studies on the most severe incidents affecting tools like GitHub...


AI-changing-how-developers-code-and-how-companies-hire-developers

AI changing how developers code and how companies hire developers


Monday, May 8, 2023 by

HackerRank released a new report on the state of AI-related coding skills and found that the nature of a developer's work is quickly evolving to keep up with advancements in Artificial Intelligence. As a result, how companies find, hire, and upskill developers must also change to match this emerging reality. HackerRank surveyed more than 42,000 global developers ...


Developers-and-brands-must-make-mobile-apps-far-more-secure

Developers and brands must make mobile apps far more secure


Tuesday, January 17, 2023 by

The bad guys are still breaking digital windows and kicking down digital doors, so to speak, and will continue well into 2023 and beyond! Consumers through experience or gut instinct will demand that their mobile app providers deliver key security features including trying to stop the increasingly prevalent "man-in-the-middle" attacks. The latest techn...


Apex-Legends-Mobile-Hyperbeat-event

Apex Legends Mobile Hyperbeat event


Tuesday, August 23, 2022 by

EA and Respawn Entertainment are pleased to announce a brand new event for Apex Legends Mobile. The Hyperbeat event launched with lots of hot new features to explore. In addition to the arrival of Legend Crypto, the Hyperbeat event also included a brand new ranked split, new events, a new Battle Pass, and updates to core systems. Hyperbeat event updates Fans ...


Promon-partners-with-F5-to-simplify-mobile-SDK-integration

Promon partners with F5 to simplify mobile SDK integration


Wednesday, October 27, 2021 by

Promon, the Oslo-based app security company announced its partnership with F5, the multi-cloud application security and delivery company. This partnership now enables F5's customers to seamlessly implement the F5 Bot Defense Mobile SDK. The solution provides developers with the necessary tools to protect their applications from bot attacks utilizing Promon'...


Advanced-digital-fingerprinting-capabilities-from-SEON

Advanced digital fingerprinting capabilities from SEON


Monday, October 25, 2021 by

SEON, the fraud fighters, have unveiled modern digital device fingerprinting capabilities designed to identify and counter the latest internet and mobile fraud tactics used by sophisticated fraudsters and bots. Advanced digital fingerprinting capabilities Fraudsters increasingly use unusual device setups to speed their efforts. Device fingerprinting can ...


Protecting-source-code

Protecting source code


Wednesday, October 6, 2021 by

Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...


SnykCon-2021-event-lineup

SnykCon 2021 event lineup


Friday, September 24, 2021 by

We're only a few weeks away from SnykCon 2021, Snyk's free annual developer conference that helps you learn how to build applications securely running October 5-7. We have a packed agenda full of expert talks, hands-on workshops, helpful demos, product roadmaps, opportunities to interact with some of the smartest speakers and leaders of developer security i...


Tech-hiring-surges-in-2021

Tech hiring surges in 2021


Wednesday, August 25, 2021 by

Tech job postings increased 16% in the second quarter of 2021, with locations, occupations, skills, and employers across the country experiencing strong quarter-over-quarter growth, according to the Q2 2021 Tech Job Report from Dice, a DHI Group, Inc. brand (NYSE: DHX).   Nationwide tech hiring surges in the second quarter of 2021 ...


Network-visibility-improves-with-Endace-and-Kemp-Technologies

Network visibility improves with Endace and Kemp Technologies


Tuesday, August 24, 2021 by

Endace and Kemp Technologies have announced a technology partnership to help security, network, and application teams dramatically reduce network investigation and incident response times while improving accuracy. Network visibility improves, helping teams reduce incident response times The enhanced network flow metadata generation and intelligent traffic mon...


Faster-customer-integrations-from-HackerOne

Faster customer integrations from HackerOne


Thursday, July 29, 2021 by

Tray.io has announced that HackerOne is using Tray Embedded to develop and deliver powerful customer integrations at scale. With Tray Embedded, HackerOne quadrupled its integration delivery speed to maximize developer efficiency and reduce the integration maintenance burden. Armed with seamless integrations, HackerOne customers can spend less time context-switching...


Not-all-security-vulnerabilities-are-created-equal

Not all security vulnerabilities are created equal


Tuesday, May 25, 2021 by

Applications are the heart of employee and user productivity. There are billions of applications each with a specific function, value and, unfortunately, they also provide one of the easiest openings for cybercriminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the concept o...


Six-areas-of-focus-for-continuous-security

Six areas of focus for continuous security


Friday, April 16, 2021 by

Applications are the heart of employee and user productivity. There are billions of applications each with a specific function and value and, unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the conce...


Denuvo-has-joined-the-PlayStation-5-Tools-and-Middleware-program

Denuvo has joined the PlayStation 5 Tools and Middleware program


Wednesday, March 10, 2021 by

As security and innovation collide, Denuvo by Irdeto announces it has joined the exclusive PlayStation®5 Tools and Middleware program. Denuvo offers its Anti-Cheat solution through this program to publishers and developers whose games are available on PlayStation®5. Denuvo is at the forefront of games security with over 2 billion unique game installs pro...


DevSecOps-will-go-mainstream-this-year

DevSecOps will go mainstream this year


Tuesday, January 26, 2021 by

Cybercriminals love Shadow Code exploits because hacking a commonly used library or service can place the malicious code on hundreds or thousands of websites. For example, the widely used jQuery JavaScript library has been breached multiple times, leading to digital skimming attacks broadly across the e-commerce sector. Adding jQuery to an application without ...


5-mistakes-businesses-make-in-application-development

5 mistakes businesses make in application development


Friday, October 23, 2020 by

5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...


HackNotice-announces-threat-intelligence-platform

HackNotice announces threat intelligence platform


Friday, September 18, 2020 by

HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...


Datagran-launches-no-code-platform

Datagran launches no-code platform


Tuesday, July 14, 2020 by

Datagran introduced its flagship platform. Designed to empower developers and growth hackers within data intensive companies, the Datagran platform allows companies to accelerate time-to-market for existing and new products and reduce the total number of tools needed to meet their business goals - without the need to write code and build APIs. Many companies today ar...


Epic-Games-partners-with-Fortumo-to-launch-carrier-billing

Epic Games partners with Fortumo to launch carrier billing


Tuesday, June 9, 2020 by

The video game and software developer and publisher Epic Games and the mobile technology company Fortumo are announcing the launch of a carrier billing partnership. Epic Games has integrated Fortumo’s carrier billing platform to collect payments for Fortnite Battle Passes, game purchases in the Epic Games Store and other Epic Games content. The first country wh...


Postal.io-redefines-offline-B2B-marketing

Postal.io redefines offline B2B marketing


Tuesday, May 5, 2020 by

Offline sales and marketing engagement is being redefined by Postal.io, particularly in today’s era of social distancing and remote work brought about by the global coronavirus pandemic. Ushering in a new era of capability and control, Postal’s sales and marketing automation platform enables enterprise B2B companies to effectively manage offline marketing pr...


Developer-survey-report-from-HackerEarth

Developer survey report from HackerEarth


Monday, May 4, 2020 by

HackerEarth released its first-ever developer survey report titled “Behind the Code: HackerEarth Developer Survey 2020.” The report gives employers and recruiters a look into the minds and motivations of today’s most hard-to-recruit and highly coveted talent and provides developers with insights on upskilling and career development. The survey resul...


One-Identity-Safeguard-now-supports-Microsoft-SQL-Server

One Identity Safeguard now supports Microsoft SQL Server


Friday, May 1, 2020 by

One Identity announced that its One Identity Safeguard solution now supports Microsoft SQL Server 2017 and SQL Server 2019 database environments. Microsoft was positioned as a Leader in the 2019 Gartner Magic Quadrant for Operational Database Management Systems*. With One Identity Safeguard, organizations can for the first time securely manage, monitor, record and audit...


To-encrypt-or-not-encrypt-legacy-devices-no-longer-a-choice

To encrypt or not encrypt legacy devices no longer a choice


Thursday, March 19, 2020 by

Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...


Dangers-of-quantum-hacking

Dangers of quantum hacking


Tuesday, February 11, 2020 by

Active Cypher has built a password-hacking quantum computer to demonstrate the dangers of quantum hacking. Using $600 worth of hardware parts easily purchased online or at a local electronics store, Active Cypher’s founder and CTO, Dan Gleason, created a portable quantum computer dubbed QUBY (named after qubits, the basic unit of quantum information). QUBY runs...


Microsoft-DART-team-tracks-77k-active-web-shells

Microsoft DART team tracks 77k active web shells


Thursday, February 6, 2020 by

In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers. According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...


StrandHogg-Android-vulnerability-identified

StrandHogg Android vulnerability identified


Thursday, December 5, 2019 by

Promon, a Norwegian app security company, has identified tangible evidence of a dangerous Android vulnerability that allows malware to pose as any legitimate app, granting hackers access to private SMS’ and photos, steal victims’ log-in credentials, track movements, make and/or record phone conversations, and spy through a phone’s camera and microphone...


Threat-of-quantum-computing-hackathon-to-award-$100,000

Threat of quantum computing hackathon to award $100,000


Monday, November 25, 2019 by

Communique Laboratory Inc. launched its quantum hackathon tackling the threat of quantum computing. Cybersecurity companies, computer science students and hackers have begun challenging the Company’s ‘quantum-safe’ encryption in a $100,000 hackathon.  The Company hosted an innovation celebration event with technology presentations from industry...


API-Manager-3-from-WSO2-released

API Manager 3 from WSO2 released


Monday, November 18, 2019 by

APIs are the essential building blocks of digital businesses—assembling data, events and services from within the organization, throughout ecosystems, and across devices. This is driving new demands for organizations to create and monetize APIs and API products; maximize adoption and reuse across internal and external portals and API marketplaces; and ensure API s...


FTC-cracks-down-on-comprehensive-data-security-for-Utah-company

FTC cracks down on comprehensive data security for Utah company


Thursday, November 14, 2019 by

A Utah-based technology company has agreed to implement a comprehensive data security program to settle Federal Trade Commission allegations that the company failed to put in place reasonable security safeguards, which allowed a hacker to access the personal information of a million consumers. InfoTrax Systems, L.C., provides back-end operation services to multi-leve...


How-to-hire-top-technical-talent

How to hire top technical talent


Monday, October 28, 2019 by

We recently spoke with Maria Chung, VP of People at HackerRank about hiring technical talent. HackerRank is a technology hiring platform that is the standard for assessing developer skills for over 1,500+ companies around the world. The current methods for technical interviewing fall flat when it comes to showcasing a candidate’s true skills. By enabling...


What-Render-announced-at-TechCrunch-Disrupt-SF

What Render announced at TechCrunch Disrupt SF's Startup Battlefield


Thursday, October 3, 2019 by

Render announced three major additions to its platform - Disks, Infrastructure as Code in the form of render.yaml and Deploy To Render button - onstage at TechCrunch Disrupt SF’s Startup Battlefield. Startup Battlefield showcases the most promising early-stage and fundamentally disruptive startups. When it comes to hosting applications in the cloud, developers ...


IBM

IBM's z15 launches with Data Privacy Passports


Friday, September 13, 2019 by

Against a backdrop of global privacy breaches, with the cost of each security breach in the U.S. clocking in on avg $8.2 million, IBM launched "z15", the enterprise platform that delivers the ability to fully manage the privacy of customer data across hybrid and multi-cloud environments. As part of the launch, IBM is announcing Data Privacy Passports, ...


INTUITION.DEV-wants-to-help-developers-survive-the-coming-tech-crash

INTUITION.DEV wants to help developers survive the coming tech crash


Tuesday, August 20, 2019 by

Hacker News announced the release of a first working version of INTUITION.DEV. INTUITION.DEV is a completely free and open source low-code tool specifically designed for professional developers, not citizen developers. Bubble (a commercial low-code tool for citizen-developers) estimated savings of ten to 50 times on traditional development costs through low-code, and...


AIPowered-protection-for-APIs

AIPowered protection for APIs


Thursday, June 20, 2019 by

The proliferation of APIs catalyzed by digital transformation initiatives is viewed as a virtual goldmine by hackers, who are hijacking tokens, cookies and keys, as well as targeting weaknesses in individual APIs. And all too often, static security controls fail to stop these attacks. Now, WSO2 and Ping Identity have partnered to protect APIs against cyber-attacks by co...