hacking

hacking magazine search results

App Developer Magazine issues we found relating to hacking


Feb14 Issue: How to Protect Your Apps From Hacking

Get advice on how to target your push alerts, use social media to promote your app for free, API monetization, learn about CES 2014, get the top things for entrepreneurs to know about mobile app development, where profits are hiding in the app store, and loads more!

hacking news search results

Developer news items we found relating to hacking

35 results
Protecting-source-code

Protecting source code


Wednesday, October 6, 2021 by

Earlier this year, EA (Electronic Arts), reported a cyberattack and the theft of some 780GB of source code for games such as FIFA 21 and the proprietary Frostbite game engine used for many other high-profile games such as Battlefield. The threat actors responsible for the EA data breach put the stolen data up for sale on an underground hacking forum for $28 million, pro...


Quantum-computing-company-receives-over-$9M-in-funding

Quantum computing company receives over $9M in funding


Thursday, August 26, 2021 by

Quantum Brilliance, a venture-backed Australian-German full-stack quantum accelerator startup, has announced closing a USD$9.7 million seed investment co-led by the QxBranch founders’ and Main Sequence investment consortium. Quantum Brilliance harnesses synthetic diamonds to build quantum accelerators that do not require near absolute zero temperature or comple...


Six-areas-of-focus-for-continuous-security

Six areas of focus for continuous security


Friday, April 16, 2021 by

Applications are the heart of employee and user productivity. There are billions of applications each with a specific function and value and, unfortunately, they also provide one of the easiest openings for cyber criminals and hackers to gain access to critical IT infrastructure and information assets. While most IT security professionals implicitly understand the conce...


Low-power-cellular-IoT-chipset-launched-by-Sony

Low power cellular IoT chipset launched by Sony


Thursday, February 25, 2021 by

Sony Semiconductor Israel (Sony) announced the launch of the Altair ALT1255, a new low-power NB2 chipset. The ALT1255 is 5G ready, designed with an integrated SIM (iSIM), user MCU, rich application layer, and GSM/GPRS fallback modem.   The ALT1255 chipset empowers device manufacturers to develop low-power, cost-sensitive connected devices at a global scale to mo...


DevSecOps-will-go-mainstream-this-year

DevSecOps will go mainstream this year


Tuesday, January 26, 2021 by

Cybercriminals love Shadow Code exploits because hacking a commonly used library or service can place the malicious code on hundreds or thousands of websites. For example, the widely used jQuery JavaScript library has been breached multiple times, leading to digital skimming attacks broadly across the e-commerce sector. Adding jQuery to an application without ...


To-encrypt-or-not-encrypt-legacy-devices-no-longer-a-choice

To encrypt or not encrypt legacy devices no longer a choice


Thursday, March 19, 2020 by

Encryption forms a strong layer of protection for our data and a last line of defense against cybercrime. By deploying encryption, users can render their data unreadable if it is compromised. Whether that means hackers intruding into the network, or an employee unwittingly exposing sensitive information, the data will be useless to any unauthorized agents who happe...


Linux-Foundation-open-sources-Project-OWL

Linux Foundation open sources Project OWL


Tuesday, March 10, 2020 by

The Linux Foundation announced Project OWL’s IoT device firmware effort will be hosted at the Foundation and is inviting developers worldwide to build mesh network nodes for global emergency communications networks. Project OWL, the winner of Call for Code 2018, is a cloud-based analytics tool that helps facilitate organization, whereabouts, and logistics for disa...


Ushur-Managed-Package-launched-on-Salesforce-AppExchange

Ushur Managed Package launched on Salesforce AppExchange


Thursday, February 20, 2020 by

Ushur announced it has launched the Ushur Managed Package on Salesforce AppExchange, empowering enterprises to add customer engagement automation capabilities to their Salesforce platform.  Ushur’s artificial intelligence (AI) platform enables enterprises to instantly and intelligently automate interactions with their customers, integrating directly into Sale...


Adjust-to-launch-Control-Center-as-part-of-Automate-Suite

Adjust to launch Control Center as part of Automate Suite


Tuesday, February 18, 2020 by

Adjust announced the launch of its pioneering new product, Control Center, which will be part of the Adjust Automate suite. With its release, Adjust aims to dramatically simplify the process of mobile advertising management for today’s marketers. Mobile has become the new undisputed king of digital, and eMarketer predicts marketers are poised to invest a record...


Dangers-of-quantum-hacking

Dangers of quantum hacking


Tuesday, February 11, 2020 by

Active Cypher has built a password-hacking quantum computer to demonstrate the dangers of quantum hacking. Using $600 worth of hardware parts easily purchased online or at a local electronics store, Active Cypher’s founder and CTO, Dan Gleason, created a portable quantum computer dubbed QUBY (named after qubits, the basic unit of quantum information). QUBY runs...


Post-quantum-computing-security

Post-quantum computing security


Wednesday, November 6, 2019 by

There is a brewing fear about Quantum computing because of the power behind moving quantum bits around in such blinding speeds that some say, will instantly break every encryption algorithm on the Internet today. DigiCert Inc. has released the results of a new survey titled, "Quantum's Peril & Promise" that highlights the ...


Two-strategic-advisors-join-Findora

Two strategic advisors join Findora


Friday, August 16, 2019 by

Findora, the cryptographically transparent public blockchain for building decentralized financial applications, has two new strategic advisors; Balaji Srinivasan, former CTO of Coinbase, and Professor Dan Boneh, Head of Stanford Cryptography.  Prior to joining Coinbase, Srinivasan was General Partner at Andreessen Horowitz, and co-founder of Earn.com,&...


Warnings-for-aircraft-cybersecurity

Warnings for aircraft cybersecurity


Thursday, August 1, 2019 by

The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...


API-security-testing-just-got-easier-with-42Crunch

API security testing just got easier with 42Crunch's new scanner


Thursday, March 21, 2019 by

42Crunch officially released the 42Crunch API Platform, an API security cloud platform to discover vulnerabilities in APIs and protect them from attack. The 42Crunch Platform can protect SaaS, Web, or IoT APIs, as well as microservices. This follows the launch of the free API Contract Security Audit tool at APISecurity.io earlier this month. The tool helps API d...


Data-science-and-the-currency-of-the-future

Data science and the currency of the future


Wednesday, February 6, 2019 by

A recent study performed by IDC and Seagate forecasted that by 2025, global data will grow to 163 zettabytes. For scale, that’s approximately 1 trillion gigabytes per zettabyte. As the amount of available data grows, businesses are clamoring for larger and larger pieces of the pie. However, when it comes to leveraging data, success doesn’t rest on the quanti...


Wireless-Gecko-portfolio-cuts-WiFi-power-consumption-in-half

Wireless Gecko portfolio cuts WiFi power consumption in half


Monday, January 28, 2019 by

Silicon Labs expands its groundbreaking Wi-Fi portfolio of modules and transceivers, enabling developers to create end node products with best-in-class power efficiency, superior RF blocking performance and advanced security. Designed for the specific needs of IoT applications, the Wireless Gecko portfolio cuts Wi-Fi power consumption in half compared to competitive off...


Gamification-can-transform-your-software-security-program

Gamification can transform your software security program


Tuesday, December 18, 2018 by

No matter the organization, or indeed their individual circumstances, there is one problem I have identified time and time again over the course of my career: AppSec managers, CISOs, CIOs and cybersecurity experts all over the world are rarely able to positively engage their dev teams on security best practice and training. It’s a source of conflict between teams,...


ALM-data-strategies-that-mimic-the-principles-of-blockchain

ALM data strategies that mimic the principles of blockchain


Friday, November 2, 2018 by

All too often, I hear from customers about a very common pain point: they do not have the data to run their business. It’s not that they lack data, but they lack trust in their data. While solving data issues can be a riddle at times, I believe this dilemma is symptomatic of antiquated and/or misappropriated application lifecycle management (ALM) systems requiring...


Machine-learning,-crowdsourced-data,-and-the-birth-of-Gengo.ai

Machine learning, crowdsourced data, and the birth of Gengo.ai


Wednesday, October 31, 2018 by

The glue that holds machine learning and artificial intelligence together is data. Without the data to create complex learning algorithms from, and to create those life-like AI experiences - neither of them are worth a brass farthing. Charly Walther, the VP of product and growth at Gengo.ai, joined Gengo from Uber, where he was a product manager in Uber’s Advan...


DuckDuckGo-vs.-Google-vs.-Privacy

DuckDuckGo vs. Google vs. Privacy


Friday, October 19, 2018 by

Online privacy is becoming harder to find - Facebook gathers users’ data to sell to third parties, Google tracks everyone’s searches, ISPs in many countries gather communication data, and governments are increasingly demanding backdoor access to encrypted devices. In the latest news, Google exposed the data of 500,000 Google+ users and didn’t...


Blockchain-IoT-can-work-to-your-advantage

Blockchain IoT can work to your advantage


Friday, October 5, 2018 by

Why do the words Blockchain and IoT still sound terrifying to some businesses? Maybe it's because Blockchain terminology was made mainstream by Bitcoin, or perhaps it's that IoT sounds immediate security alarms. According to IBM, using Blockchain in asset management, customs declarations, supply chain networks, commercial property leasing, and countless more ...


Presidential-Alerts-and-the-future-of-mobile-communication

Presidential Alerts and the future of mobile communication


Thursday, October 4, 2018 by

FEMA has sent their first emergency test message to all of the mobile devices throughout the United States. They reported every American who owns a smartphone - which is about 75% of the population, should have received the test alert. In total the message went out to a total of 225 million devices right around 1:18 PM CST reading "Presiden...


Top-ten-ICO-scams-that-swindled-over-$687M

Top ten ICO scams that swindled over $687M


Friday, September 28, 2018 by

Initial Coin Offerings are one of the most tempting investment options for those hoping to profit from the ever-evolving world of cryptocurrency. However, the lack of regulation has allowed ICO investors to become targets of sneaky schemes. Though ICOs have snowballed, with more than 750 being invested in during 2018 alone, the number of scams has also steadily risen...


Decentralized-application-development-boosted-with-Lisk-Core-1.0

Decentralized application development boosted with Lisk Core 1.0


Thursday, August 30, 2018 by

Lisk commenced the official release of Lisk Core 1.0 to its Mainnet following a period of rigorous testing and development. By utilizing sidechain technology written in JavaScript, Lisk’s Sidechain Development Kit (SDK) will enable developers to build scalable decentralized applications on blockchain, including deploying their own custom tokens. Commenting...


Merged-mining-partnership-between-Bitmain-and-Elastos

Merged mining partnership between Bitmain and Elastos


Tuesday, August 28, 2018 by

Elastos (ELA) announced a merged mining partnership with Bitmain Technologies. The merged mining partnership means that for miners and future users of the smart web platform, it guarantees the security of the Bitcoin network by sharing its hashpower. Merged mining allows Bitcoin (BTC) and the ELA coin to be mined simultaneously and more efficiently, and conserves energy...


A-quantum-blockchain-can-stop-quantum-computing-from-hacking-it

A quantum blockchain can stop quantum computing from hacking it


Monday, August 13, 2018 by

We have yet to see the full promise of Blockchain play out but companies and scientists are already close to launching a technology that could theoretically break it: quantum computers. Such machines can compute data exponentially faster than traditional computers. Earlier this year, Google began testing Bristlecone, a quantum computer chip that its creators think wi...


Questioning-the-future-of-privacy-and-the-safety-of-personal-identity

Questioning the future of privacy and the safety of personal identity


Thursday, June 28, 2018 by

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR. These findings and more are outlin...


New-partnership-emerges-to-simply-IoT-security

New partnership emerges to simply IoT security


Wednesday, May 16, 2018 by

In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...


CEO-Roundtable-participants-announced-for-Telecom-Exchange-NYC-2018

CEO Roundtable participants announced for Telecom Exchange NYC 2018


Wednesday, May 9, 2018 by

Jaymie Scotto & Associates (JSA), founder and host of the C-Level networking event series, the Telecom Exchange (TEX), announced its CEO Roundtable participants and topics for its 2018 TEX NYC event, taking place June 19-20 in Hoboken, NJ. The event will feature four CEO Roundtables, providing a major platform for tech, telecom and content thought leaders to deliber...


This-API-api-security-solution-to-use-AI

This API api security solution to use AI


Thursday, February 1, 2018 by

To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...


How-to-protect-IP-communications-from-telecom-fraud

How to protect IP communications from telecom fraud


Thursday, December 28, 2017 by

Software-based IP communications continue to grow in popularity because of the added reliability, reach and control they allow businesses to have over their telecom resources. However, as more developers continue to transfer enterprise communications from legacy telcos to cloud-based service providers, the threat of telecom fraud and cyber-attacks also rise. Accord...


Making-a-mobile-game-that-sticks-this-season

Making a mobile game that sticks this season


Wednesday, December 27, 2017 by

‘Tis the season to be gaming. With dozens of new titles expected to hit the shelves, app stores and console and PC marketplaces this holiday season, it’s critical that developers level up their strategies for a successful game launch to earn a hefty slice of this year’s holiday gaming sales pie.After building a terrific game, a successful holiday launch hinges on provid...


DevSecOps-is-important-and-here-is-why

DevSecOps is important and here is why


Friday, October 20, 2017 by

In the digital age, securing your development projects against malicious hackers can be quite the challenge. And when you take security and try to scale security to an enterprise, the challenge seems insurmountable. Evident by the frequent hacking incidents we see come through the news.Enter DevSecOps. DevSecOps is a methodology that interweaves the aspects of DevOps an...


Sending-out-an-S.O.S.-for-SMS

Sending out an S.O.S. for SMS


Wednesday, October 4, 2017 by

What a difference a year makes. Just one year after the National Institute of Standards and Technology issued guidance that found SMS is insecure and no longer suitable as a strong authentication mechanism, it has walked all of that back.At the time the original draft was published, it was highly unusual for any US government agency to get out in front of the security i...


Behavioral-and-biometric-mobile-authentication-will-end-passwords

Behavioral and biometric mobile authentication will end passwords


Friday, September 15, 2017 by

You can say this about passwords: they're incredibly resilient. Not in a bulletproof kind of way but, more precisely, in terms of how long they've been around. According to Robert Svensson in his book "From Hacking to Report Writing: An Introduction to Security and Penetration," the first computer system to use passwords was built by researchers at the Massachusetts Ins...