Secure mobile VNCphone puts an end to mobile spying
Tuesday, August 13, 2024 by Austin Harris
With the VNCphone, VNC presents a unique combination of mobile phones, hardened operating system and pre-installed applications for secure mobile communication and collaboration.
Secure mobile VNCphone puts an end to mobile spying
With VNCphone, VNC, a developer of open source-based enterprise applications, now enables professional mobile working without spyi...
Geo-Fraud Detection mobile app by Appdome
Friday, August 2, 2024 by Freeman Lightner
Appdome announced it has enhanced its Geo-Fraud Detection service to include two new defenses: Geo-Location Fencing and Geo DeSync Attack Detection. Combined with other Geo-Compliance features available on the Appdome platform, mobile app developers and enterprises can eliminate location-based fraud, ensure geo-compliance and deliver location relevant use...
Quantum cryptography and network market is growing
Friday, May 5, 2023 by Richard Harris
The global quantum cryptography and network market was valued at US$ 698.31 million in 2022 and is projected to reach US$ 8,136.60 million by 2031 at a projected CAGR of around 32.99% during the forecast period 2023-2031. The increasing need for secure communication and data transfer, along with the rising adoption of quantum cryptography solutions by governments a...
SKAdNetwork and Private Relay quasi-VPN
Thursday, June 30, 2022 by Nathan Darst
During Apple's Worldwide Developers Conference (WWDC) 2020 and 2021, Apple came out with major updates to privacy that impacted mobile marketers for years to come in the iOS space. It’s no surprise everyone was waiting with bated breath to see where Apple would take us with WWDC 2022 announcements around iOS 16. While there were certainly going to be some...
How to avoid mobile phone apps from leaking your personal data
Wednesday, November 18, 2020 by Brittany Hainzinger
Most people have dozens of mobile phone apps installed on their phone, tablet, or even their smartwatch. In fact, the average person has about 60 to 90 mobile phone apps on their phone. Out of all those apps, many of them could be leaking your personal data. How can you protect yourself? One of the primary ways is by installing a VPN, but there are other ways, too. Here...
Ekata releases global identity verification dataset
Tuesday, June 16, 2020 by Brittany Hainzinger
Ekata announced the release of the latest innovation to its global identity verification dataset, Network Score. Network Score is a machine learning prediction that enables businesses to better identify good and bad customers based on a series of insights. The new dataset flags potentially risky digital transactions and fraudulent customers by analyzing the activity pat...
3 Steps to manage work-from-home assets as we get back to the office
Friday, April 24, 2020 by Brittany Hainzinger
Just over the horizon for American businesses and government agencies is the return to the traditional office work environment. But what will companies and agencies do with the new laptops and other devices they put into employee homes in order to keep things going during state-imposed stay-at-home orders? The International Association of IT Asset Managers (IAITAM) ...
MyPrivacy app has officially launched
Tuesday, March 3, 2020 by Brittany Hainzinger
MyPrivacy has officially launched. The breakthrough product, which was built to make privacy vulnerabilities easy to manage for the average user, is a one-stop app that offers a VPN, App Lock, Password Manager, Private Browser, Photo Vault, and Social Permissions Manager sharing a simple, user-friendly platform.
The app has already been downloaded over 300,000 since ...
Zero Trust platform from Pulse Secure is enhanced
Tuesday, October 29, 2019 by Richard Harris
Pulse Secure announced that it has introduced new Secure Access management and threat mitigation capabilities within its Zero Trust Network Access platform. Through these enhancements, Pulse Secure enables enterprise and service provider organizations to progress Zero Trust security and mitigate hybrid IT risks while simplifying access to multi-cloud and data center res...
UK parliamentary report says Facebook should be regulated
Monday, February 18, 2019 by Austin Harris
Facebook and its executives have been labeled "digital gangsters" in a UK parliamentary report that calls for the company to be regulated, after an 18-month long investigation. The 180-page document says that Facebook willfully broke data privacy and competition laws.
A summary of the UK parliamentary report finds
Compulsory Code of Ethics for te...
Building secure IoT AI Blockchain apps with PiQube
Tuesday, January 8, 2019 by Austin Harris
NetObjex, Inc., a provider of Digital Operating Platforms for Smart Products, has announced it will be introducing a revolutionary new IoT-AI-Blockchain gateway device at the Consumer Electronics Show.
PiQube (pronounced "Pie-Cube") will be launched at the CES 2019 Event from January 8th to the 11th at the Las Vegas Convention Center, Nevada. This sta...
Privacy for Android boosted with decentralized VPN
Sunday, January 6, 2019 by Austin Harris
Mysterium Network, an open-source, not-for-profit foundation reinventing internet privacy, security, and freedom, has announced the release of the Mysterium VPN app for Android, which is now available on the Google Play store.
The app, which was released today and is also available for Windows and macOS, will allow users to participate in the world’s first dece...
Industrial IoT platform gets updates from Pulse Secure
Monday, December 17, 2018 by Richard Harris
Pulse Secure, a provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access...
DuckDuckGo vs. Google vs. Privacy
Friday, October 19, 2018 by Richard Harris
Online privacy is becoming harder to find - Facebook gathers users’ data to sell to third parties, Google tracks everyone’s searches, ISPs in many countries gather communication data, and governments are increasingly demanding backdoor access to encrypted devices. In the latest news, Google exposed the data of 500,000 Google+ users and didn’t...
Enterprise security report says mobile workers put data at risk
Wednesday, October 10, 2018 by Austin Harris
According to a new study titled Greatest Mobile Security Threats in the Enterprise, a significant lack of visibility into devices and networks is putting businesses at risk for data leakage and phishing attacks. The study, conducted by Enterprise Mobility Exchange and commissioned by NetMotion Software, showed that nearly 50 percent of mobile workers spend the majority ...
A guide to ad retargeting responsibly
Tuesday, August 7, 2018 by Richard Harris
Browse any website with ads, then load up your favorite mobile game and you might see advertisements from the searches you did on the website you were just on, now inside your game! How is this possible? It's called ad retargeting, or behavioral retargeting, and it's gone wild everywhere digital.
How does ad retargeting work?
There are actually a few ...
What American companies can learn from Europe's new GDPR laws
Wednesday, June 13, 2018 by Austin Harris
People around the world have recently started to receive tons of emails from companies updating their privacy policies. Naturally, many ask, why this is happening, and the ones with a deeper understanding of the process mutter a four-letter combination - GDPR. While an astounding part of the US Senate appears to be confused about the concept of Net Neutrality, Europe&rs...
Pulse Secure expands to support hybrid IT with secure access
Monday, April 16, 2018 by Richard Harris
Pulse Secure has announced new cloud and virtual appliances to protect access and support applications in hybrid IT environments. Enterprises are quickly moving to deploy hybrid IT, leveraging the cloud to introduce new user services and gain disaster recovery resiliency, as well as continuing to use the data center when they must have total control of the application. ...
Netskope unifies enterprise cloud and web security
Thursday, April 5, 2018 by Austin Harris
Netskope has announced the general availability of Netskope for Web, an expansion of the Netskope Cloud Security platform that enables safe web use for enterprise organizations. Powered by the same cloud-native architecture and patented Cloud XD technology of the award-winning and market-leading Netskope cloud access security broker (CASB), Netskope for Web uniquely und...
What the Section 702 bill means to your digital privacy
Wednesday, January 24, 2018 by Austin Harris
Recently, President Trump signed the Section 702 bill “to reauthorize foreign intelligence collection.” The NSA warrantless surveillance program is still a sweeping up Americans’ online communications, even though Trump has tweeted:“This is NOT the same FISA law that was so wrongly abused during the election. I will always do the right thing for our country and put the ...
DevSecOps is important and here is why
Friday, October 20, 2017 by Richard Harris
In the digital age, securing your development projects against malicious hackers can be quite the challenge. And when you take security and try to scale security to an enterprise, the challenge seems insurmountable. Evident by the frequent hacking incidents we see come through the news.Enter DevSecOps. DevSecOps is a methodology that interweaves the aspects of DevOps an...
CoachGuitar teaches you guitar and lets us look under the hood
Wednesday, September 6, 2017 by Richard Harris
CoachGuitar is a five-year old, France-based company that offers a unique method of teaching guitar enthusiasts of all skill levels how to play their favorite songs. Using the visual guitar teaching app, millions of students from around the globe download video tutorials and learn to play along. With a typical traffic of 2,000-3,000 downloads per day - and even reaching...
Appdome integrates into the AppConfig community
Monday, August 14, 2017 by Richard Harris
Appdome, a cloud hub for mobile app integration, has joined the AppConfig Community, re-affirming its ongoing commitment to a secure and efficient mobile industry. AppConfig’s best practice feature-set can now be automatically integrated in apps via the Appdome platform, all without any code or coding. App Publishers (ISVs) and enterprise app developers can add AppConfi...
Metadata can be deadly in cyber exploitation
Tuesday, July 18, 2017 by Austin Harris
When someone says "There's no cause for concern, it's only metadata" you can send them this:Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data po...
Enterprise threat dubbed HospitalGown infests thousands of apps
Tuesday, June 6, 2017 by Richard Harris
Appthority, an enterprise mobile threat protection company, published research on a newly discovered backend data exposure vulnerability, dubbed HospitalGown, that highlights the connection between mobile apps and insecure backend databases containing enterprise data. Appthority documented more than 1,000 apps with this vulnerability, and researched in detail 39 applica...
Many fintech DevOps are not enforcing security
Tuesday, June 6, 2017 by Austin Harris
Venafi has announced the results of a study on the cryptographic security practices of DevOps teams in the financial services industry. Cryptographic security risks are amplified in DevOps settings, where compromises in development or test environments can spread to production systems and applications. This is a particular issue for financial services organizations, whi...
Improve mobile app security by turning it into code
Monday, May 8, 2017 by Jeff Williams
Why is application security such a pain? One of the hard problems with application security is that there are a zillion different ways that things can go wrong. Far more than any one person can be expert in. It's unfair to think that a software developer, who is already supposed to be expert in all the latest software languages, frameworks and best practices, should als...
Instart Logic brings Helios AIDriven security out into the open
Friday, April 28, 2017 by Richard Harris
In ancient mythology, Helios was the Greek god of the sun streaking across the heavens in a chariot shining much-needed light onto a dark and dangerous world. That’s exactly what Instart Logic, is doing with their latest announcement of Helios - "using artificial intelligence to illuminate and solve today’s most challenging digital security issues."Web application attac...
NodeSource N|Solid for Alpine Linux
Wednesday, April 19, 2017 by Austin Harris
NodeSource, the Node.js company, has announced the release of NodeSource N|Solid for Alpine Linux, the newest addition to its enterprise-grade Node.js platform that enables a secure, reliable and extensible platform for Node.js applications. The latest release makes it easier for teams using Docker containers with the popular Alpine Linux distribution to leverage the en...
Google Machine Learning autotranslation included in Collavate 3.9.1
Tuesday, April 18, 2017 by Austin Harris
Collavate, Inc. has released Collavate version 3.9.1. The upgraded version includes improvements to enhance the use of their platform - an original Cloud-based document management and workflow processing solution with security for personal Gmail and Google G Suite. This update includes website widgets, a fully-functional task master, an auto-translating feature and a ne...
VPNs will not protect your privacy but this might
Monday, April 10, 2017 by Richard Harris
Editors note: Guest submission by Shaun Murphy, CEO of sndrCongress repealed FCC privacy regulations, set by Obama’s administration, that required Internet Service Provider’s (ISP’s) to obtain affirmative consent from customers before storing and using personal data for any purpose. This revelation has raised privacy concerns among consumers, and has sparked a debate of...
How companies can keep their remote teams safe
Monday, April 3, 2017 by Gene Richardson
If you hate bringing your work home with you, spare a thought for the 3.7 million Americans for whom home is the workplace.The telecommuter population is growing faster than the overall employee base, according to Global Workplace Analytics, and with half of all jobs deemed suitable for performing from home, it is a trend that is set to go on growing. Already, around a ...
Wait, the CIA can comprimise my iPhone or Android
Tuesday, March 14, 2017 by Austin Harris
In the largest leak of C.I.A. documents, Wikileaks disclosed the tools that C.I.A. uses to hack computers, phones and smart TVs around the world. The C.I.A.’s ability to compromise Apple and Android smartphones is especially troubling, since spies can access private information through these devices, including photos, emails, texts and videos. Further, a program ca...
10 reasons to hide your IP address
Wednesday, March 1, 2017 by Richard Harris
You have an IP address if you are reading this. Your IP (Internet Protocol) address is simply a series of numbers separated by dots (or octets) that represent where you are, or "what network" you are originating traffic from. Now, you might be behind a firewall - which means you have a NATed IP address, in fact all computers behind your NAT firewall will have the same p...
Ways you can protect yourself on the Internet
Thursday, February 23, 2017 by Richard Harris
Editors note: Guest submission by Anas Baig, a Digital Marketer & Security Enthusiast.Anyone can fall victim to hacking, and this fact is as evident as the shining sun. Every time you go online, you are, by default, vulnerable to cyber attacks. Hackers can steal your credit card info, social security number, username and passwords, or even render your PC completely ...