hackers

hackers news search results

Developer news items we found relating to hackers

35 results
HackNotice-announces-threat-intelligence-platform

HackNotice announces threat intelligence platform


Friday, September 18, 2020 by

HackNotice announced the launch of HackNotice Teams, a cybersecurity management platform powered by actionable threat intelligence and an industry solution to foster a company-wide culture of security. Built on HackNotice Premium’s technology, HackNotice Teams scours the dark web to alert employees of vulnerabilities, compromised information, and data breaches in ...


Datagran-launches-no-code-platform

Datagran launches no-code platform


Tuesday, July 14, 2020 by

Datagran introduced its flagship platform. Designed to empower developers and growth hackers within data intensive companies, the Datagran platform allows companies to accelerate time-to-market for existing and new products and reduce the total number of tools needed to meet their business goals - without the need to write code and build APIs. Many companies today ar...


One-Identity-Safeguard-now-supports-Microsoft-SQL-Server

One Identity Safeguard now supports Microsoft SQL Server


Friday, May 1, 2020 by

One Identity announced that its One Identity Safeguard solution now supports Microsoft SQL Server 2017 and SQL Server 2019 database environments. Microsoft was positioned as a Leader in the 2019 Gartner Magic Quadrant for Operational Database Management Systems*. With One Identity Safeguard, organizations can for the first time securely manage, monitor, record and audit...


To-encrypt-or-not-encrypt-legacy-devices-no-longer-a-choice

To encrypt or not encrypt legacy devices no longer a choice


Thursday, March 19, 2020 by

Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...


Dangers-of-quantum-hacking

Dangers of quantum hacking


Tuesday, February 11, 2020 by

Active Cypher has built a password-hacking quantum computer to demonstrate the dangers of quantum hacking. Using $600 worth of hardware parts easily purchased online or at a local electronics store, Active Cypher’s founder and CTO, Dan Gleason, created a portable quantum computer dubbed QUBY (named after qubits, the basic unit of quantum information). QUBY runs...


Microsoft-DART-team-tracks-77k-active-web-shells

Microsoft DART team tracks 77k active web shells


Thursday, February 6, 2020 by

In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers. According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...


StrandHogg-Android-vulnerability-identified

StrandHogg Android vulnerability identified


Thursday, December 5, 2019 by

Promon, a Norwegian app security company, has identified tangible evidence of a dangerous Android vulnerability that allows malware to pose as any legitimate app, granting hackers access to private SMS’ and photos, steal victims’ log-in credentials, track movements, make and/or record phone conversations, and spy through a phone’s camera and microphone...


Threat-of-quantum-computing-hackathon-to-award-$100,000

Threat of quantum computing hackathon to award $100,000


Monday, November 25, 2019 by

Communique Laboratory Inc. launched its quantum hackathon tackling the threat of quantum computing. Cybersecurity companies, computer science students and hackers have begun challenging the Company’s ‘quantum-safe’ encryption in a $100,000 hackathon.  The Company hosted an innovation celebration event with technology presentations from industry...


API-Manager-3-from-WSO2-released

API Manager 3 from WSO2 released


Monday, November 18, 2019 by

APIs are the essential building blocks of digital businesses—assembling data, events and services from within the organization, throughout ecosystems, and across devices. This is driving new demands for organizations to create and monetize APIs and API products; maximize adoption and reuse across internal and external portals and API marketplaces; and ensure API s...


What-Render-announced-at-TechCrunch-Disrupt-SF

What Render announced at TechCrunch Disrupt SF's Startup Battlefield


Thursday, October 3, 2019 by

Render announced three major additions to its platform - Disks, Infrastructure as Code in the form of render.yaml and Deploy To Render button - onstage at TechCrunch Disrupt SF’s Startup Battlefield. Startup Battlefield showcases the most promising early-stage and fundamentally disruptive startups. When it comes to hosting applications in the cloud, developers ...


IBM

IBM's z15 launches with Data Privacy Passports


Friday, September 13, 2019 by

Against a backdrop of global privacy breaches, with the cost of each security breach in the U.S. clocking in on avg $8.2 million, IBM launched "z15", the enterprise platform that delivers the ability to fully manage the privacy of customer data across hybrid and multi-cloud environments. As part of the launch, IBM is announcing Data Privacy Passports, ...


AIPowered-protection-for-APIs

AIPowered protection for APIs


Thursday, June 20, 2019 by

The proliferation of APIs catalyzed by digital transformation initiatives is viewed as a virtual goldmine by hackers, who are hijacking tokens, cookies and keys, as well as targeting weaknesses in individual APIs. And all too often, static security controls fail to stop these attacks. Now, WSO2 and Ping Identity have partnered to protect APIs against cyber-attacks by co...


Acronis-gives-developers-early-access-to-new-cyber-platform

Acronis gives developers early access to new cyber platform


Monday, April 29, 2019 by

Acronis announced the opening of its core platforms, enabling broad, third-party developer access to the Acronis Cyber Platform to encourage expanded functionality and application integrations while expanding their opportunities in Acronis’ large ecosystem. The Acronis Cyber Platform, which is the foundation of the company’s existing services, features a ...


WordPress-plugin-vulnerabilities-are-a-hackers-playground

WordPress plugin vulnerabilities are a hackers playground


Wednesday, April 10, 2019 by

What do TechCrunch, BBC America, PlayStation and MTV News all have in common? Each of their websites is powered by WordPress. Over 74.6 million, or roughly 30 percent, of the world’s websites, depend on WordPress to power their online platforms. Every second there are over six new WordPress.com posts and over 47,000 plugins, with the number growing daily. Wh...


Corona-labs-goes-open-source-and-developers-are-nervous

Corona labs goes open source and developers are nervous


Tuesday, January 8, 2019 by

Corona Labs, which provides a free cross-platform mobile development tool used to create 2D applications, has announced that after years of planning, the Corona game engine will finally be released as an open-source project. Corona Labs expects that by making their engine an open-source project, issues like adaptation to sudden market changes, updates, and requirements ...


Join-us-for-a-free-mobile-app-security-threats-webinar-on-Tuesday

Join us for a free mobile app security threats webinar on Tuesday


Friday, December 7, 2018 by

In 2016, a record 3 billion Yahoo accounts were hacked, and Uber reported that hackers stole the information of over 57 million accounts. Then in 2017, 412 million user accounts were taken from Friendfinder’s sites, and 147.9 million consumers were affected by the Equifax Breach. In 2018, Under Armor said that that it's My Fitness Pal app was hacked, affecting...


AI-for-cybersecurity-

AI for cybersecurity


Tuesday, November 27, 2018 by

As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...


IAST-supports-AppSec-efficiencies-while-cutting-costs-and-headaches

IAST supports AppSec efficiencies while cutting costs and headaches


Monday, November 26, 2018 by

It’s easy to feel passionate about interactive application security testing (IAST) in the world of application security. You see, IAST makes security testing almost invisible. It’s not something that requires a highly trained team to be brought in to carry out and analyze testing results. It doesn’t hold up other teams or processes from moving forward....


A-quantum-blockchain-can-stop-quantum-computing-from-hacking-it

A quantum blockchain can stop quantum computing from hacking it


Monday, August 13, 2018 by

We have yet to see the full promise of Blockchain play out but companies and scientists are already close to launching a technology that could theoretically break it: quantum computers. Such machines can compute data exponentially faster than traditional computers. Earlier this year, Google began testing Bristlecone, a quantum computer chip that its creators think wi...


How-the-reddit-security-breach-reminds-us-to-be-careful

How the reddit security breach reminds us to be careful


Monday, August 6, 2018 by

reddit recently disclosed in their announcements feed of a security breach into their system which the hacker "managed to access some user data, including some current email addresses and a 2007 database backup containing old salted and hashed passwords." Include in the disclosed information was some reddit source code and some log files. They went on to sa...


Avoid-mobile-cybersecurity-threats-by-checking-the-source

Avoid mobile cybersecurity threats by checking the source


Thursday, July 5, 2018 by

Earlier this month IT news organizations around the globe reported that Epic Games’ popular Fortnite game was being counterfeited and malicious actors were, in fact, lacing the imposter apps with malware. We’re only human, and people unwittingly let their guard down in anticipation of something they're passionate about, or when they think they might b...


Questioning-the-future-of-privacy-and-the-safety-of-personal-identity

Questioning the future of privacy and the safety of personal identity


Thursday, June 28, 2018 by

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR. These findings and more are outlin...


Key-takeaways-from-CA-Technologies-Built-to-Change-Summit-2018

Key takeaways from CA Technologies Built to Change Summit 2018


Friday, June 8, 2018 by

The CA Technologies’ 2nd annual Built to Change Summit(BTC) lead to the release of a whole bunch of exciting new technology and research projects pertaining to DevOps, GDPR regulations, Agile project management, and more. The overall theme of the event being to make their development platforms “frictionless” for their users, allowing them to create and...


ZipperDown-vulnerability-puts-thousands-of-iOS-apps-at-risk

ZipperDown vulnerability puts thousands of iOS apps at risk


Tuesday, May 22, 2018 by

ZipperDown vulnerability has put at risk potentially thousands of iOS apps on the market. Pangu Lab recently found that a vulnerability previously discovered in OAuth security is now being exploited by hackers to run malicious code on iOS applications. Casey Ellis, CTO of Bugcrowd, recently spoke on the matter, giving an in-depth technical overview of ZipperDown to deve...


Supporting-citizen-developers-to-speed-digital-transformation

Supporting citizen developers to speed digital transformation


Thursday, May 10, 2018 by

More than just a buzz word, companies across the globe are embracing digital transformation to create more efficient organizations not tied to traditional software applications and to forgo the messy paper trail. Digital transformation is dependent on many factors, but in particular, cloud-based technology is largely responsible for fueling the change. Simply put, overt...


What-is-an-API-and-why-are-they-important-to-developers

What is an API and why are they important to developers


Wednesday, April 11, 2018 by

API is technically short for “Application Programming Interface”, and the term is tossed around in the programming industry so much, the overall complexity of what they are and how they can make your life easier - or a living hell gets overlooked. It’s amusing that there are so many street-talk definitions for what an API is too. One definition I found is “a set of...


Progressive-web-apps-vs-native-apps:-Showdown-in-2018

Progressive web apps vs native apps: Showdown in 2018


Thursday, March 1, 2018 by

Apps have become an integral part of any brand's digital marketing efforts. You'd be hard-pressed to find a company that hasn't, at the very least, thought about developing an app. It would be even more difficult to find a company willing to deny the tremendous impact that an app can have on a brand's engagement and customer experience.   Given th...


This-API-api-security-solution-to-use-AI

This API api security solution to use AI


Thursday, February 1, 2018 by

To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...


Bitcoin-exchange-apps-are-risky-claims-new-report

Bitcoin exchange apps are risky claims new report


Monday, January 29, 2018 by

RiskIQ claims that the app stores are hosting 661 blacklisted Bitcoin apps which leave users open to hackers. They analyzed 18,408 apps across 20 app stores (mostly Android based),  but including Apple, Google Play, SameAPK, and APKPlz.Fabian Libeau, EMEA VP of RiskIQ, warned anybody considering downloading such software to be extremely cautious and to research eac...


Dataguise-recognized-in-MarketsandMarkets-datacentric-security-report

Dataguise recognized in MarketsandMarkets datacentric security report


Thursday, January 25, 2018 by

Dataguise was cited a new report titled Data-Centric Security Market Global Forecast to 2022 published by IT research firm MarketsandMarkets. In the report, analysts forecast the global data-centric security market to grow from USD $1.79 Billion in 2016 to USD $5.83 Billion by 2022, at a compound annual growth rate (CAGR) of 23.1%. The report indicates that sensitive da...


Overcoming-IoT-security-threats-to-achieve-better-ROI

Overcoming IoT security threats to achieve better ROI


Monday, January 8, 2018 by

With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...


How-to-protect-IP-communications-from-telecom-fraud

How to protect IP communications from telecom fraud


Thursday, December 28, 2017 by

Software-based IP communications continue to grow in popularity because of the added reliability, reach and control they allow businesses to have over their telecom resources. However, as more developers continue to transfer enterprise communications from legacy telcos to cloud-based service providers, the threat of telecom fraud and cyber-attacks also rise. Accord...


Making-a-mobile-game-that-sticks-this-season

Making a mobile game that sticks this season


Wednesday, December 27, 2017 by

‘Tis the season to be gaming. With dozens of new titles expected to hit the shelves, app stores and console and PC marketplaces this holiday season, it’s critical that developers level up their strategies for a successful game launch to earn a hefty slice of this year’s holiday gaming sales pie.After building a terrific game, a successful holiday launch hinges on provid...


Software-testing-considerations-for-voicefirst-applications

Software testing considerations for voicefirst applications


Saturday, December 2, 2017 by

The names Alexa and Echo are household names and someday soon, most people will have these devices in their homes, ordering takeout, picking out a song, answering trivia questions. Welcome to the voice-first applications era. Amazon and Google have sold millions of Amazon Alexa and Echo and Google Home devices and 24.5 million voice-first devices are expected to ship be...


Why-your-app-should-have-OAuth-2.0

Why your app should have OAuth 2.0


Tuesday, November 14, 2017 by

Consumer demand couldn’t be more clear - the more apps, the better. On average, consumers launch at least nine apps per day and more than 30 each month, and they tend to browse such apps for hours at a time. Users spend more than three hours a day on their smartphones, and nearly 90 percent of that time is devoted to apps. While much is made of app responsiven...