mobile security

mobile security magazine search results

App Developer Magazine issues we found relating to mobile security


Sept13 Issue: Mobile Security In the Age of BYOD

Inside this issue we have the Top Global Apps report from Distimo you won't want to miss! NTIA's code of conduct for app developers and how it's going to affect your app development efforts, why push notifications should be a part of most apps, what to consider with COPPA compliancy when developing apps, everything you need to know about app store optimization, and loads more!

mobile security news search results

Developer news items we found relating to mobile security

35 results
Join-us-for-a-free-mobile-app-security-threats-webinar-on-Tuesday

Join us for a free mobile app security threats webinar on Tuesday


Friday, December 7, 2018 by

In 2016, a record 3 billion Yahoo accounts were hacked, and Uber reported that hackers stole the information of over 57 million accounts. Then in 2017, 412 million user accounts were taken from Friendfinder’s sites, and 147.9 million consumers were affected by the Equifax Breach. In 2018, Under Armor said that that it's My Fitness Pal app was hacked, affecting...


AimBrain-joins-the-ForgeRock-Trust-Network-with-biometric-solutions

AimBrain joins the ForgeRock Trust Network with biometric solutions


Thursday, December 6, 2018 by

AimBrain announced its place on the ForgeRock Trust Network, which recently celebrated the traction made by the end of its first year. ForgeRock Trust Network is a global partner programme designed to provide organizations with access to a comprehensive range of authentication, risk and fraud management, identity proofing and identity enrichment solutions, all of which ...


The-differences-between-web-apps-and-native-apps

The differences between web apps and native apps


Thursday, October 18, 2018 by

Even in 2018, years past the origional question, the debate rages on across the land, in office spaces and conference rooms every day - should we build a full-blown native mobile app, or is distributing over the web good enough? By now everyone knows the “mobile-first” mentality because statistics like 50% of web searches being done from a mobile dev...


Enterprise-security-report-says-mobile-workers-put-data-at-risk

Enterprise security report says mobile workers put data at risk


Wednesday, October 10, 2018 by

According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...


30,000-blacklisted-apps-hosted-on-the-Google-Play-Store-report-finds

30,000 blacklisted apps hosted on the Google Play Store report finds


Friday, September 21, 2018 by

RiskIQ has released its Mobile Threat Landscape Q2 2018 Report, which analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings show a spike in blacklisted apps headlined by Trojans and Adware, as well as a fascinating shift in tactics by mobile threat actors. For the second year in a row, RiskIQ observed a sharp increase in black...


Fortnite-for-Android-is-a-trailblazing-risk-for-mobile-banking

Fortnite for Android is a trailblazing risk for mobile banking


Tuesday, August 14, 2018 by

CEO Tim Sweeny of Epic Games, the publisher of the wildly popular Fortnite game, is on a mission to “advance the openness of all platforms” - not to mention side-step Google’s 30% take of developer proceeds - by distributing Fortnite for the Android platform via their website rather than the Google Play store. I applaud a maverick challenging the statu...


Detect-eavesdropping-in-your-mobile-app-with-TrustKit

Detect eavesdropping in your mobile app with TrustKit


Wednesday, July 11, 2018 by

Data Theorem, Inc. announced the availability of TrustKit Analytics, a new service for the TrustKit community that delivers advanced security insights. In addition, the company announced that since TrustKit’s release in 2015, it has identified more than 100 million eavesdropping attempts on iOS and Android applications, where apps in active mode have blocked 100 p...


Avoid-mobile-cybersecurity-threats-by-checking-the-source

Avoid mobile cybersecurity threats by checking the source


Thursday, July 5, 2018 by

Earlier this month IT news organizations around the globe reported that Epic Games’ popular Fortnite game was being counterfeited and malicious actors were, in fact, lacing the imposter apps with malware. We’re only human, and people unwittingly let their guard down in anticipation of something they're passionate about, or when they think they might b...


Mobile-Threat-Landscape-reports-steady-decrease-in-blacklisted-apps

Mobile Threat Landscape reports steady decrease in blacklisted apps


Friday, June 1, 2018 by

RiskIQ has released its Mobile Threat Landscape Q1 2018 Report, which analyzed 120 mobile app stores and more than two billion daily scanned resources. The findings showed that taking advantage of the popularity and volatility of the cryptocurrency landscape is paying off for threat actors via the mobile attack vector and that malicious apps leveraged by nation-state ac...


TapSafe-warranty-app-launches-at-CES

TapSafe warranty app launches at CES


Monday, January 15, 2018 by

TapSafe, a new warranty app and platform, will help consumers find, identify and protect all of their connected devices. The new product, developed by AmTrust Innovation, the products and services innovation arm of AmTrust Financial, allows users to buy warranty protection and technical support for any connected devices. Nearly three-quarters (74%) of US households have...


Does-your-organization-need-the-iPhone-X-or-not

Does your organization need the iPhone X or not


Thursday, November 30, 2017 by

Do I need the new iPhone? No. But, I sure do want it.It’s interesting that with the 10-year (aluminum) anniversary of the device, Apple has gone all glass around stainless steel, doing away with the aluminum frame for its flagship product.Now that the device has been launched, organizations will undoubtedly see a quick spike in broken, lost, and stolen devices - with en...


The-battle-of-biometric-security-coming-in-2018

The battle of biometric security coming in 2018


Friday, November 3, 2017 by

Fingerprint sensors first appeared in smart devices in 2007 and then gained momentum as a 4-digit PIN code replacement in 2013's Apple iPhone 5S. Hailed as the future of authentication by some, fingerprint's security weaknesses were quickly exposed by the children of sleepy dads, cats' paws and gummy bears. Still, the lure of convenience today and the promise of securit...


Codeless-security-integrations-by-Blackberry-and-Appdome-announced

Codeless security integrations by Blackberry and Appdome announced


Tuesday, August 15, 2017 by

BlackBerry Limited and Appdome, a cloud hub for mobile app integration, announced they are enabling codeless integration of secure voice, video and messaging capabilities. Available under Appdome’s newest service category, Secure Messaging, the BBM Enterprise SDK (software development kit) offers a growing set of secure communications capabilities that mobile app develo...


Appdome-integrates-into-the-AppConfig-community

Appdome integrates into the AppConfig community


Monday, August 14, 2017 by

Appdome, a cloud hub for mobile app integration, has joined the AppConfig Community, re-affirming its ongoing commitment to a secure and efficient mobile industry. AppConfig’s best practice feature-set can now be automatically integrated in apps via the Appdome platform, all without any code or coding. App Publishers (ISVs) and enterprise app developers can add AppConfi...


New-biometric-authentication-could-be-a-password-killer

New biometric authentication could be a password killer


Wednesday, July 12, 2017 by

Pramati Technologies has announced the ThumbSignIn biometric authentication SaaS platform for mobile and web applications and additionally its certification by the FIDO Alliance. The platform enables enterprises and service providers to deploy strong authentication solutions that reduce reliance on passwords and protect against phishing, man-in-the-middle, and replay at...


Apperian-announces-new-security-capabilities

Apperian announces new security capabilities


Monday, July 3, 2017 by

Apperian, an Arxan company and provider of mobile application management (MAM) and security solutions, has announced several platform enhancements, which increase the security of enterprise mobile app data. These updates take advantage of native device capabilities, multiple industry protocols and additional password controls, to provide a solution for distributing secu...


Why-runtime-application-selfprotection-is-critical-for-app-security

Why runtime application selfprotection is critical for app security


Tuesday, June 20, 2017 by

Today most of us go about implementing security from the outside in. The common practice is to start by defining a perimeter and trying to defend it with various security tools. Even though perimeters have been porous for more than a decade, we still can’t give up this notion that if we build a better wall we can keep our enterprises safer.Certainly that is where most e...


Biometric-authentication-for-your-apps-from-Appdome-and-BehavioSec

Biometric authentication for your apps from Appdome and BehavioSec


Wednesday, April 26, 2017 by

Appdome, a cloud service that automates mobile integration by fusing new services to mobile apps, is partnering up with biometric authentication technology company, BehavioSec. Appdome for BehavioSec now enables mobile developers and mobility professionals (such as mobile fraud, IT, or Security groups) to rapidly integrate advanced biometric and behavior based authentic...


How-companies-can-keep-their-remote-teams-safe

How companies can keep their remote teams safe


Monday, April 3, 2017 by

If you hate bringing your work home with you, spare a thought for the 3.7 million Americans for whom home is the workplace.The telecommuter population is growing faster than the overall employee base, according to Global Workplace Analytics, and with half of all jobs deemed suitable for performing from home, it is a trend that is set to go on growing. Already, around a ...


Intentbased-mobile-app-security:-It

Intentbased mobile app security: It's harder than you think


Thursday, March 23, 2017 by

Recently, intent-based security has become a buzzword and a commonly used phrase in the developer community. However, this new wave of security is much more than just a catchphrase. The concept of intent-based security adds a new level of protection to applications in containerized environments, specifically by understanding what the app is intended to do and looking fo...


Canonical-collaborates-to-with-NXP-to-improve-IoT

Canonical collaborates to with NXP to improve IoT


Wednesday, March 22, 2017 by

NXP and Canonical have collaborated to port Ubuntu Core to the LS1043A, a quad-core SoC targeted at IoT gateways and networking equipment. With this combination, device manufacturers gain a platform with which to build high throughput IoT Gateways.Ubuntu Core has been used in a variety of devices from IoT Gateways to network equipment. IoT Gateways benefit from the wide...


ImmuniWeb-Mobile-launches-to-offer-better-mobile-security-testing

ImmuniWeb Mobile launches to offer better mobile security testing


Wednesday, March 15, 2017 by

High-Tech Bridge announces the launch of ImmuniWeb Mobile as part of ImmuniWeb Application Security Testing Platform. The new offering will provide comprehensive assessment of iOS and Android mobile applications, mobile infrastructure backend and data channel encryption. All ImmuniWeb Mobile packages are provided with a zero false-positives SLA. The mobile application s...


How-Trump-will-affect-the-technology-industry

How Trump will affect the technology industry


Friday, January 20, 2017 by

To many, it seemed like we’d never make it to 2017. After a bruising presidential campaign, perhaps the longest in electoral history. But here we are, our first true, post-election year in eight years. For me, these years are always fun, with soaring hopes dashed and ill tidings avoided. Moreover, it’s during these post-election years that we quietly return to the ...


Scanning-JavaScript-for-vulnerabilities:-How-the-impossible-is-now-possible

Scanning JavaScript for vulnerabilities: How the impossible is now possible


Friday, January 13, 2017 by

Javascript is everywhere, and it's awesome! But the world most popular language can be riddled with problems if you aren't a careful programmer.There is a saying that speaks to the incredible popularity of JavaScript as a programming language and it goes like this: “any application that can be written in JavaScript, will eventually be written in JavaScript.” The we...


Vinous-acquires-Delectable-and-Banquet-wine-apps

Vinous acquires Delectable and Banquet wine apps


Monday, December 12, 2016 by

Vinous CEO and Founder Antonio Galloni has acquired the wine apps Delectable and Banquet. Known as the "Instagram of wine," the app has been downloaded over a million times and has over 120,000 monthly loyal, unique users.    Delectable allows users to scan a wine label with their smartphones and immediately pull up reviews and tasting notes from a rich comm...


Core-Security-is-making-the-password-reset-process-selfservice,-faster-and-simpler

Core Security is making the password reset process selfservice, faster and simpler


Wednesday, November 30, 2016 by

Core Security announced the release of Core Mobile Reset 1.0 and Core Access Insight 9.2. With the introduction of these solution updates, enterprise security teams will now be able to resolve immediate threats with prognostic analytics applied to the big identity and access data, while also enhancing organizational efficiency.Ineffective password management i...


New-Security-Report-2016-shows-64-percent-of-millennials-experienced-a-comprised-account-hack

New Security Report 2016 shows 64 percent of millennials experienced a comprised account hack


Thursday, November 17, 2016 by

TeleSign has released its Consumer Account Security Report 2016, providing insight into consumer sentiments on online security and the value they place on their digital lives. Of the 1,300 U.S. consumers surveyed, nearly a third report the value of their online life at $100,000 to priceless. Further, more than half of the respondents surveyed (55 percent) place the onus...


What-happens-to-security-when-your-apps-go-to-the-cloud

What happens to security when your apps go to the cloud


Wednesday, November 9, 2016 by

When Marc Andreessen wrote, “software is eating the world,” he meant that every business is literally turning into software. The problem is that every line of code you write makes you easier to attack. Historically, we dealt with security by putting up walls and scanning. But the complexity of modern software environments has made these approaches ineffective ...


Resonance-launches-SDK-For-proximitybased-device-pairing

Resonance launches SDK For proximitybased device pairing


Friday, November 4, 2016 by

Resonance has emerged from stealth to announce the availability of its new proximity-based software development kit (SDK) for device pairing. Developers are using the Resonance SDK to create advanced mobile application features for a wide range of iOS and Android apps where secure device-to-device connectivity can provide value - gaming, e-commerce, payments, retail, tr...


Paving-the-way-to-smarter-phone-security

Paving the way to smarter phone security


Wednesday, October 19, 2016 by

75 million Smartphone users admit that while they are afraid of cyber attacks, they have not set a password for their smartphones according to the latest TransUnion’s Cyber Security Survey. While at first glance, this seems completely alarming and the ramifications could result in identity theft, it is also not surprising as consumers are not technologists and they just...


The-growing-gap-between-the-speed-of-business-and-the-pace-of-software-development

The growing gap between the speed of business and the pace of software development


Monday, October 17, 2016 by

The rapid pace of business today is only increasing, which means companies need quick access to effective, flexible and scalable technology in order to succeed. IT organizations are simply struggling to keep up with this growing demand for business applications, which can’t be developed fast enough, updated often enough, or maintained well enough. It’s a com...


SOTI-MobiControl-13.2-Ships-to-help-enterprises-manage-devices

SOTI MobiControl 13.2 Ships to help enterprises manage devices


Monday, October 17, 2016 by

SOTI Inc. announced the availability of SOTI MobiControl 13.2. MobiControl provides mobility management across all endpoints, seamlessly managing mobile devices, connected peripherals, applications, content, and security from within a single management console.Version 13.2 of SOTI’s flagship product, is now improved with a variety of powerful new features, includin...


Security-First:-5-tips-for-building-a-secure-mobile-app-from-the-ground-up

Security First: 5 tips for building a secure mobile app from the ground up


Wednesday, October 5, 2016 by

With more than two billion smartphone users worldwide, the app market has exploded — along with risks. Mobile app developers are still struggling to make security a priority and by 2017, cyber-attacks via vulnerable apps are anticipated to account for 75% of all mobile security breaches. Given what's at stake, it's critical that developers build apps that are &ldq...


Apple-developer-patents,-hacks,-and-iOS-10--oh-my!-October-issue-lands

Apple developer patents, hacks, and iOS 10 oh my! October issue lands


Saturday, October 1, 2016 by

It’s hard to believe - but fall is upon us and 2017 is right around the corner. October always ushers in the feeling of campfires, fall-festivals, and what the flip and I going to do with my apps for the holiday season coming up!   Not to worry everyone - our October issue is here, and it’s over 90 pages of industry news, tips, and articles ...


Iris-Scanning-and-the-Future-of-Mobile-Security

Iris Scanning and the Future of Mobile Security


Wednesday, September 14, 2016 by

The promise of iris scan technology has been shown in sci-fi movies for decades. Various governments use it to secure borders, defense facilities, banks use it to authenticate high value transactions, secure access to safes and vaults. Recent advancements in the evolving mobile biometrics field has brought iris recognition technology to our hands – to our mobi...