threats

threats news search results

Developer news items we found relating to threats

35 results
Zero-day-vulnerability-announced-byMcAfee-at-Defcon

Zero-day vulnerability announced byMcAfee at Defcon


Monday, August 19, 2019 by

At DEFCON, McAfee has announced the discovery of a zero-day vulnerability in a commonly used Delta industrial control system. The vulnerability found in the Delta enteliBUS Manager could allow malicious actors complete control of the operating system, enabling remote manipulation of access control systems, boiler rooms, temperature control for critical systems and mo...


Cloud-computing-security-report-2019-is-out-from-CSA

Cloud computing security report 2019 is out from CSA


Thursday, August 8, 2019 by

The Cloud Security Alliance (CSA) defines standards, certifications, and best practices to help ensure a secure cloud computing environment. The CSA has released "Top Threats to Cloud Computing: The Egregious Eleven", a report which re-examines the risks inherent with cloud security and takes a new approach, examining the problems inherent in configu...


Warnings-for-aircraft-cybersecurity

Warnings for aircraft cybersecurity


Thursday, August 1, 2019 by

The Department of Homeland Security issued a security alert for small planes, warning that modern flight systems are vulnerable to hacking if someone manages to gain physical access to the aircraft. Engine readings, compass data, altitude and other readings “could all be manipulated to provide false measurements to the pilot,” according to the DHS alert.&nbs...


Microsoft-Azure-Sphere-certified-processor-coming-in-2020

Microsoft Azure Sphere certified processor coming in 2020


Friday, June 21, 2019 by

NXP Semiconductors N.V. announced a collaboration with Microsoft to deliver a new Microsoft Azure Sphere certified crossover applications processor, as an extension to their popular i.MX 8 high-performance applications processor series. The collaboration will deliver a secure, ultra-efficient, intelligent embedded processor for edge nodes that seamlessly runs Azure Sphe...


Anomaly-detection-by-Instaclustr-processes-19-billion-events-per-day

Anomaly detection by Instaclustr processes 19 billion events per day


Wednesday, June 19, 2019 by

Instaclustr announced it has successfully created an anomaly detection application capable of processing and vetting real-time events at a uniquely massive scale – 19 billion events per day – by leveraging open source Apache Cassandra and Apache Kafka and Kubernetes container orchestration. Get the source code on github. Anomaly detection is the identific...


The-most-popular-gaming-platform,-and-why-cloud-gaming-sucks

The most popular gaming platform, and why cloud gaming sucks


Friday, March 22, 2019 by

Gamers spend an average of 7 hours, 7 mins each week playing (up 19% from last year), and cloud is the next frontier for video games it seems, with major tech players like Microsoft and Google teasing their cloud gaming launches at GDC 19. But getting gamers on board with these new services will require developers to create interactive games that don’t frustr...


Software-engineer-happiness-matters

Software engineer happiness matters


Tuesday, February 19, 2019 by

In the never-ending quest for greater developer productivity, security and compliance usually seem like monkey wrenches in the machinery. These aspects of development are essential, but they can slow down the flow of work and frustrate developers. Security and compliance dog the whole software development process, from the too-often-forgotten build engineering team, ...


UK-parliamentary-report-says-Facebook-should-be-regulated

UK parliamentary report says Facebook should be regulated


Monday, February 18, 2019 by

Facebook and its executives have been labeled "digital gangsters" in a UK parliamentary report that calls for the company to be regulated, after an 18-month long investigation. The 180-page document says that Facebook willfully broke data privacy and competition laws. A summary of the UK parliamentary report finds Compulsory Code of Ethics for te...


Kong-Brain-and-Kong-Immunity-launches-powered-by-AI-and-ML

Kong Brain and Kong Immunity launches powered by AI and ML


Thursday, January 17, 2019 by

Kong Inc. has launched Kong Brain and Kong Immunity for its Kong Enterprise API platform. Powered by artificial intelligence (AI) and machine learning, the new, advanced features will help automate the entire API and service development lifecycle from pre-production to post-production to provide organizations with an intelligent, end-to-end API solution. By automating p...


Industrial-IoT-platform-gets-updates-from-Pulse-Secure

Industrial IoT platform gets updates from Pulse Secure


Monday, December 17, 2018 by

Pulse Secure, a provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access...


Join-us-for-a-free-mobile-app-security-threats-webinar-on-Tuesday

Join us for a free mobile app security threats webinar on Tuesday


Friday, December 7, 2018 by

In 2016, a record 3 billion Yahoo accounts were hacked, and Uber reported that hackers stole the information of over 57 million accounts. Then in 2017, 412 million user accounts were taken from Friendfinder’s sites, and 147.9 million consumers were affected by the Equifax Breach. In 2018, Under Armor said that that it's My Fitness Pal app was hacked, affecting...


AI-for-cybersecurity-

AI for cybersecurity


Tuesday, November 27, 2018 by

As organizations struggle to deal with the growing sophistication of hackers and the influx in data breaches, it's becoming clear that AI could be a critical tool for automatically defending applications from cyber attacks - but there are challenges to overcome. Ivan Novikov, the CEO of AI security company Wallarm, offers some insight below on how AI can be utilized...


Container-security-considerations-for-developers

Container security considerations for developers


Monday, October 29, 2018 by

On the path to a secure digital business, secure service containers bring the best of agility and security to development teams – a growing concern for companies from startups to the Fortune 500. By moving the security concern out of the application layer into an encompassing container platform, one provides a very elegant solution to significantly reduced attack ...


Enterprise-security-report-says-mobile-workers-put-data-at-risk

Enterprise security report says mobile workers put data at risk


Wednesday, October 10, 2018 by

According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...


Presidential-Alerts-and-the-future-of-mobile-communication

Presidential Alerts and the future of mobile communication


Thursday, October 4, 2018 by

FEMA has sent their first emergency test message to all of the mobile devices throughout the United States. They reported every American who owns a smartphone - which is about 75% of the population, should have received the test alert. In total the message went out to a total of 225 million devices right around 1:18 PM CST reading "Presiden...


AWS-and-Salesforce-announce-new-integrations

AWS and Salesforce announce new integrations


Tuesday, September 25, 2018 by

AWS and Salesforce just announced at Dreamforce 2018 new integrations that they hope will dramatically simplify how data and events are shared across AWS and Salesforce services.   As part of the next phase of their global strategic alliance, the two companies will work together to deliver integrations and frameworks for connecting the Salesforce Platform with AW...


Code-security-gamification-company-nabs-$3.5M-in-funding

Code security gamification company nabs $3.5M in funding


Friday, September 14, 2018 by

Secure application development platform provider Secure Code Warrior announced that it has gained US $3.5 million in funding from two strategic venture capital firms. The financing was led by Washington DC-based Paladin Capital Group, with participation from Sydney-based AirTree Ventures. The initial funding round will allow the company to further expand its rapidly gro...


VMworld-2018-sees-new-VMware-cloud-operations-services-drop

VMworld 2018 sees new VMware cloud operations services drop


Thursday, August 30, 2018 by

At VMworld 2018, VMWare addressed the challenges of multi-­cloud environments head-­on, announcing new and enhanced VMware Cloud Services that will enable cloud operations, DevOps, and security and compliance teams to better manage cloud costs, operations, security, and compliance across clouds. The advancements to VMware’s cloud operations platform includ...


iOS-12-subscription-based-app-tips-for-success

iOS 12 subscription based app tips for success


Wednesday, August 29, 2018 by

Last year, Apple held a secret meeting with a select group of iOS app developers in New York to talk about changing the current app delivery model from one-time purchases to subscription-based. From Apple’s view, these one-time purchases typically are inexpensive ($1-2), yet grant end-users unlimited access to the app and support, which can prove to be costly from...


Data-masking-report-finds-GDPR-is-pressing-the-need-for-solutions

Data masking report finds GDPR is pressing the need for solutions


Thursday, August 23, 2018 by

Dataguise has been recognized in a new report on data masking by Gartner titled, Market Guide for Data Masking. As data growth continues and data analytics becomes a mission-critical operation throughout the enterprise, Dataguise has been supporting the need to protect sensitive information in the wake of new data privacy regulations such as the General Data Protec...


Fortnite-for-Android-is-a-trailblazing-risk-for-mobile-banking

Fortnite for Android is a trailblazing risk for mobile banking


Tuesday, August 14, 2018 by

CEO Tim Sweeny of Epic Games, the publisher of the wildly popular Fortnite game, is on a mission to “advance the openness of all platforms” - not to mention side-step Google’s 30% take of developer proceeds - by distributing Fortnite for the Android platform via their website rather than the Google Play store. I applaud a maverick challenging the statu...


How-the-reddit-security-breach-reminds-us-to-be-careful

How the reddit security breach reminds us to be careful


Monday, August 6, 2018 by

reddit recently disclosed in their announcements feed of a security breach into their system which the hacker "managed to access some user data, including some current email addresses and a 2007 database backup containing old salted and hashed passwords." Include in the disclosed information was some reddit source code and some log files. They went on to sa...


Autonomous-vehicles-and-data-collection-talks-coming--August-7-8

Autonomous vehicles and data collection talks coming August 7-8


Wednesday, August 1, 2018 by

Three no-cost discussion sessions will explore the growing importance of data capture, use and safe/reliable storage in vehicles and the autonomous transportation at the Flash Memory Summit August 7-8 at the Santa Clara Convention Center. During the free sessions; engineers, executives, urban planners, government officials and transportation researchers will explore ...


Avoid-mobile-cybersecurity-threats-by-checking-the-source

Avoid mobile cybersecurity threats by checking the source


Thursday, July 5, 2018 by

Earlier this month IT news organizations around the globe reported that Epic Games’ popular Fortnite game was being counterfeited and malicious actors were, in fact, lacing the imposter apps with malware. We’re only human, and people unwittingly let their guard down in anticipation of something they're passionate about, or when they think they might b...


Questioning-the-future-of-privacy-and-the-safety-of-personal-identity

Questioning the future of privacy and the safety of personal identity


Thursday, June 28, 2018 by

While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t believe that individuals will be able to protect their privacy and online identity, even with precautionary measures and new regulations such as GDPR. These findings and more are outlin...


SWORD-attached-smartphone-device-can-detect-weapons-and-explosives

SWORD attached smartphone device can detect weapons and explosives


Thursday, June 7, 2018 by

The urgent challenge for security personnel to noninvasively scan people in real time and in public to detect and “see” if they are carrying weapons or explosives without physically searching them could soon be solved with the launch of SWORD by Royal Holdings Technologies Corporation (Royal Holdings). SWORD attaches to a Google Pixel 2 XL smartphone and ...


Artificial-Intelligence-in-the-public-and-private-sectors

Artificial Intelligence in the public and private sectors


Thursday, June 7, 2018 by

You're not the only one nervous about AI -in light of rapid AI growth and adoption, the U.S. Government recently held three Subcommittee Meetings designed to understand the implications posed by the widespread adoption of AI technology in the public and private sectors. So why is the US Government concerned about AI in society, and what role should it be considering...


FTP-vulnerabilities-and-what-you-can-do

FTP vulnerabilities and what you can do


Thursday, May 24, 2018 by

File Transfer Protocol or (FTP) for short is old, and when I say old - I mean 1971 old when it was initially published as RFC 114. It defines a way clients can transfer files to a server. Typically gated with a password and either sent clear text, or over SSL/TLS/SFTP, it’s a rock solid way to get files sent to their destination and is widely supported. But in today’s w...


What-some-experts-are-saying-about-GDPR

What some experts are saying about GDPR


Friday, May 18, 2018 by

The GDPR bill is causing an uproar in the industry as the compliance date comes ever nearer. Yet few can say they actually know much about the bill that will come into place on May 25th.GDPR, or the General Data Protection Regulation, is an expansion upon the EU’s previous Data Protection Act of 1998, extending the boundary of its territorial mandate from whatever juris...


Alternative-Google-Play-app-stores-to-consider

Alternative Google Play app stores to consider


Tuesday, May 15, 2018 by

Android is open source, and because of that -app developers can build and deploy an APK file anywhere! There are obvious advantages to deploying into the known Android app stores such as Google Play, and Amazon - mostly in the potential number of impressions and installs your app can receive, because Google play comes as the default app store on most Android devices. Pl...


A-Blockchain-messaging-platform-that

A Blockchain messaging platform that's unstoppable


Tuesday, April 3, 2018 by

Today’s instant messaging is about to get a violent shove forward by way of encryption, and Blockchain. Almost all messaging platforms rely on client to server communication, where a unique ID is given to a thread, and stored in a centralized database somewhere. But it’s always been volatile to censorship, network blocking, or any other form of controlled policing....


New-software-security-guide-from-SAFECode-publishes

New software security guide from SAFECode publishes


Monday, April 2, 2018 by

The Software Assurance Forum for Excellence in Code (SAFECode) announced the publication of the Fundamental Practices for Secure Software Development: Essential Elements of a Secure Development Life Cycle Program (Third Edition).The guide was written by SAFECode members to help software developers, development organizations and technology users initiate or improve their...


This-API-api-security-solution-to-use-AI

This API api security solution to use AI


Thursday, February 1, 2018 by

To protect global organizations against ever-increasing security threats, Axway has announced a global partnership with Elastic Beam. Together, the two companies will help organizations achieve optimal security and ecosystem engagement by leveraging an AI engine, integrated with Axway API Gateway, that automatically detects and blocks new attacks on APIs. The Elastic Be...


Dataguise-recognized-in-MarketsandMarkets-data-centric-security-report

Dataguise recognized in MarketsandMarkets data-centric security report


Thursday, January 25, 2018 by

Dataguise was cited a new report titled Data-Centric Security Market Global Forecast to 2022 published by IT research firm MarketsandMarkets. In the report, analysts forecast the global data-centric security market to grow from USD $1.79 Billion in 2016 to USD $5.83 Billion by 2022, at a compound annual growth rate (CAGR) of 23.1%. The report indicates that sensitive da...


Phobio-is-partnering-with-Conversable

Phobio is partnering with Conversable


Monday, January 22, 2018 by

Phobio has announced a partnership and teaming agreement with Conversable. The partnership will provide enterprises with an all new workforce communication experience through Phobio’s mobile application, Rodio.Rodio provides a two-way communication system designed specifically for enterprises to send important updates, promotions, and other strategic messages to remote ...