Blog Posts Tagged with "Mobile Applications"

9ae0fe776de46500a4f71f32673fad0f

Increasing Importance of Mobile Makes Malware a Priority

January 17, 2018 Added by:Asma Zubair

Businesses should fortify their high value apps with additional security precautions from the inside out.

Comments  (0)

4eb356e09746aadc2f4800877e8c24e8

Mobile App Security Series: Common Failures With User Authentication

February 11, 2013 Added by:Brandon Knight

In the third, and last, installment in the Mobile App Security Series, we will be taking a look at some common flaws found in the way that mobile apps, or more accurately, the backend services which support them, perform authentication.

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

California AG Releases Mobile App Guidelines; Industry Responds

January 24, 2013 Added by:David Navetta

The guidelines separately address app developers, app platform providers, mobile ad networks, operating system providers, and mobile carriers. A coalition of advertising and marketing industry groups recently responded, criticizing the guidelines...

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

The Fine Print of Smartphone Privacy

September 14, 2012 Added by:Allan Pratt, MBA

How often do you think about your cell phone or smartphone privacy? Sure, you think about its physical security, but how often do you think about the security of your data? Your contacts, your email addresses, your location data, your apps, etc. You probably don’t think about this enough...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Will the Rise of Tablets Affect Security Measures in the Workplace?

September 11, 2012 Added by:Robert Siciliano

While your company’s IT guy has a relative hold on the work laptops and desktops, and even some of the mobiles, he is quickly losing control when you bring your new Droid and connect it to the corporate network. Now he has to worry if that last app you downloaded will infect the network...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Are Your Mobile Apps Up To No Good?

September 06, 2012 Added by:Robert Siciliano

Why would an app to monitor your battery need to know your location via your GPS? How come gaming apps ask users for their phone numbers? Mobile applications, especially free ones, require your personal data to supplement development costs. This means “free” isn’t exactly free...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Three Domains Seized for Distributing Pirated Android Apps

August 27, 2012 Added by:Headlines

“Software apps have become an increasingly essential part of our nation’s economy and creative culture, and the Criminal Division is committed to working with our law enforcement partners to protect the creators of these apps and other forms of intellectual property from those who seek to steal it..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Does Jailbreaking or Rooting Affect Mobile Device Security?

August 01, 2012 Added by:Robert Siciliano

By hacking your device, you can potentially open security holes that may have not been readily apparent, or undermine the device’s built-in security measures. Jailbroken and rooted phones are much more susceptible to viruses and malware...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Between You and Me, This is Not Private...

July 22, 2012 Added by:Fergal Glynn

If most websites can’t get password storage right, you can bet they can’t get storage of the content you are trusting them with right either. The private documents that you stored with your favorite cloud service are probably not encrypted in a way that only your account can decrypt, if they’re encrypted at all...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Unveil Advanced Malware Detection Method

June 29, 2012 Added by:Headlines

Unlike traditional malware detection tools, RiskRanker does not rely on malware samples and signatures already identified. It is able to identify applications that exhibit signs of malicious code while they are still in the marketplace, before the malware is downloaded onto potential victim's mobile devices...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Are the Risks of Mobile Spam?

June 05, 2012 Added by:Robert Siciliano

While spam is mostly annoying, it can also pose some risks. You could even be tricked into paying for products and services that turn out to be illegitimate or nonexistent. Spam can also be used to distribute Trojans, spyware, and exploit code that can infect your mobile device or steal your information...

Comments  (2)

53692ae1a8e713373b8a487ce89ee3e2

Three Areas to Test when Assessing Mobile Applications

May 02, 2012 Added by:Tom Eston

Mobile Application testing is something that will evolve as mobile apps get more complex and the business drives more towards mobile solutions. If you’re deploying mobile apps for your business it’s more important than ever to have testing done on three areas at a minimum....

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Mobile Applications Shouldn’t Roll Their Own Security

May 01, 2012 Added by:Brent Huston

Many of the applications being designed are being done so by scrappy, product oriented developers. This is not a bad thing for innovation - in fact just the opposite - but it can be a bad thing for safety, privacy and security...

Comments  (0)

4e21f96122846f32545687ad42b271e2

Some "LightReading" about Mobile Application Security

February 10, 2012 Added by:Security Ninja

Developers, project managers and executive officers need to be able to evaluate the risk that they are exposing their customers and their businesses to. They need to know how to measure the security posture of their apps and to make decisions on what changes to make...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

IT Trends for 2011 and Beyond

December 25, 2011 Added by:Bill Gerneglia

CIOs and senior IT business decision makers must maintain a focus on specific trends that will effect the industries in which they compete. You should already be thinking about how technology is going to help shape your business far into the future. CIOs have to be forward-thinking...

Comments  (0)


Most Liked