Microsoft DART team tracks 77k active web shells
Thursday, February 6, 2020 by Brittany Hainzinger
In a blog post promoting the capabilities of its commercial security platform, Microsoft said that on a daily basis the company's security team detects and tracks on average around 77,000 active web shells, spread across 46,000 infected servers.
According to ZDNet, these numbers are staggering, since the 77,000 figure is far larger than any previous reports about...
Explaining graph databases to a developer
Tuesday, October 17, 2017 by Richard Harris
Organizations are increasingly beginning to grasp onto the power of graph databases, which helps them unlock business value within connections, influences and relationship within their data. Graph databases enable new applications to adapt to changing business needs and existing applications to scale with the business.To learn more about how organizations can implement ...
Prevent disasters with risk management and being a grown up!
Friday, January 27, 2017 by Gordon McKeown
We live in an era of dramatic, improbable events that adversely affect the economy, the environment, the fate of household name companies and people’s welfare and health. Or at least they seem improbable until they hurl themselves violently upon us from the shadows of our agreeable ignorance. Strangely, with hindsight they often appear inevitable. Bloated, failed banks ...
What the mobile AR phenomenon has taught us about security
Thursday, October 13, 2016 by Aaron Lint
The extraordinary success of Pokémon Go has been surprising, even in the rapidly changing paradigm of the mobile application space. The game, which allows users to hunt down and capture virtual monsters, uses Augmented Reality (AR) technology to display the creatures in real world locations such as parks, homes, and offices.Pokémon Go has already broken five Guinness Wo...
Cloud Security Alliance Issues Mobile Application Security Testing Report
Monday, August 1, 2016 by Stuart Parkerson
The Cloud Security Alliance has released a new report surrounding its Mobile Application Security Testing Initiative. The purpose of the report is to provide the Alliance’s insight into building out a roadmap for establishing a more secure cloud ecosystem to protect mobile applications.The Alliance’s Mobile Application Security Testing (MAST) Initiative offers...
Five Common Mobile App Security Vulnerabilities And How to Fix Them
Saturday, April 30, 2016 by Seth Jaslow
Mobile app security leaves much to be desired. That was the conclusion of a 2016 Hewlett Packard Enterprise (HPE) study which found that a staggering 96 percent of 36,000 mobile apps failed at least one of 10 privacy checks. Three years ago, a similar HPE study found that 97 percent of 2,000 apps reviewed held insecure private information. As mobile app usage conti...
Kony Makes Updates to Visualizer Cross Platform Solution
Thursday, March 17, 2016 by Richard Harris
Kony has released a number of updates to the cloud-based Kony Visualizer application design and development solution offered through Kony’s Mobility Platform. Enabling cross-platform mobile app development, the release of Visualizer 7.0 includes updates to simplify and accelerate the mobile app development process, enabling developers to build connected, omni-chann...
New Mobile Security Report Shows Most Apps Have Critical Vulnerabilities
Tuesday, November 10, 2015 by Richard Harris
Checkmarx and AppSec Labs have released a new mobile app security titled “The State of Mobile Application Security 2014-2015”. Among the findings of the report is that the typical app is exposed to an average of 9 different vulnerabilities. The report also indicates in situations where vulnerabilities are built into the code or application logic, the vulnerability of iO...
JScrambler Now Protects Node.js with Version 3.6 of HTML5 and JavaScript App Protection Service
Friday, September 12, 2014 by Richard Harris
JScrambler, a web application security company, has announced the release of JScrambler 3.6, the latest version of its HTML5/JavaScript protection service.With this new version, Node.js applications are now supported, making JScrambler a more complete solution to protect JavaScript source code from the client to the server. This release was fully tested with Node.js rel...
JScrambler 3.5 Offers Self Defending Capabilities for HTML5 and JavaScript Web Apps
Wednesday, March 19, 2014 by Richard Harris
JScrambler is introducing new self defending capabilities for HTML5/JavaScript applications with its release of JScrambler 3.5. Self defending offers an active protection technique which provides apps with the capability to react to source code modifications (tampering) and debugging at runtime.Without protecting code, pirates can violate license agreements, s...