Top

Category: Application security


Application security, Mobile, Privacy protection, Security

Thousands of Android Apps Are Silently Accessing Your Data

April 3, 2020

Via: Wired

MORE THAN 4,000 Google Play apps silently collect a list of all other installed apps in a data grab that allows developers and advertisers to build detailed profiles of users, a recently published research paper found. The apps use an […]


Application security, Cloud security, Security

Do You Know Your Responsibilities When It Comes to Container Security?

March 24, 2020

Via: Security Intelligence

As you migrate your enterprise to the public cloud or multicloud, you want to realize some of its inherent benefits regardless of what service model you utilize. Whether your goal is cost optimization, scalability or elasticity, the cloud can allow […]


Application security, Cloud security, Security

7 Spring Cleaning Tasks to Improve Data Security

March 20, 2020

Via: Security Intelligence

This year, March 19 ushered in spring in the Northern Hemisphere — the first time since 1896 that the season has started so early. So why not take advantage of the season’s early arrival to do some spring cleaning, not […]


Application security, Cyber-crime, Malware, Security, Vulnerabilities

Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

March 16, 2020

Via: Security Intelligence

The video gaming landscape has changed drastically over the past few decades. Some of these changes have led to considerable developments in the cyberthreat landscape as it applies to gaming companies, the games themselves and the user base that enjoys […]


Application security, Security

How Visa built its own container security solution

March 9, 2020

Via: CSO Online

Like many large enterprises, financial services giant Visa has embraced containerization technologies that enable companies to move from legacy monolithic apps to microservice-based application architectures that are easier to maintain, update and deploy at scale on cloud infrastructure. But splitting […]


Application security, Mobile, Mobile security, Security

Which are the most dangerous mobile app stores online?

February 28, 2020

Via: Security Affairs

Mobile users downloaded over 200 billion apps in 2019 and the overall expense in app stores worldwide has been estimated in more than $120 billion. Threat actors don’t want to miss this amazing business opportunity and are using rogue apps […]


Application security, Security, Threats & Malware, Vulnerabilities

APIs are becoming a major target for credential stuffing attacks

February 19, 2020

Via: CSO Online

New data from security and content delivery company Akamai shows that one in every five attempts to gain unauthorized access to user accounts is now done through application programming interfaces (APIs) instead of user-facing login pages. This trend is even […]


Application security, Security

Microsoft Trials Election Security Solution in Wisconsin

February 18, 2020

Via: Security Week

Introduced in May 2019, the free software development kit (SDK) was created in collaboration with Galois, aiming to provide end-to-end verification of elections. Moreover, the tool opens election results to third-party organizations for secure validation. Made available last year to […]


Application security, Security, Threats & Malware, Vulnerabilities

MIT Researchers Find Vulnerabilities in Voatz Voting App

February 14, 2020

Via: Security Week

The application was used during the 2018 midterm elections in West Virginia, and was also deployed in elections in Denver, Oregon, and Utah. It was also used at the 2016 Massachusetts Democratic Convention and the 2016 Utah Republican Convention. Developed […]


Application security, Security

How AI will improve API security

January 29, 2020

Via: InfoWorld

APIs have become the crown jewels of organizations’ digital transformation initiatives, empowering employees, partners, customers, and other stakeholders to access applications, data, and business functionality across their digital ecosystem. So, it’s no wonder that hackers have increased their waves of […]