Google’s Waze Can Allow Hackers to Identify and Track Users

The company already patched an API flaw that allowed a security researcher to use the app to find the real identity of drivers using it. Continue reading Google’s Waze Can Allow Hackers to Identify and Track Users

UPDATE – TikTok Ban: Security Experts Weigh in on the App’s Risks

With no hard evidence of abuse, are bans warranted? The real security concerns will likely come after the ban goes into effect, researchers said in our exclusive roundtable. Continue reading UPDATE – TikTok Ban: Security Experts Weigh in on the App’s Risks

Developing a COVID-19 track and trace app — through the lens of Synopsys

The rapidly evolving COVID-19 emergency has set off a global race to trace, and Synopsys offers key considerations for track and trace application development.
The post Developing a COVID-19 track and trace app — through the lens of Synopsys appeared … Continue reading Developing a COVID-19 track and trace app — through the lens of Synopsys

CyRC analysis: CVE-2020-7958 biometric data extraction in Android devices

We dig into the inner workings of trustlets, how different components work together to provide a Trusted Execution Environment, and how to attack them.
The post CyRC analysis: CVE-2020-7958 biometric data extraction in Android devices appeared first o… Continue reading CyRC analysis: CVE-2020-7958 biometric data extraction in Android devices

New Android Banking Trojan Targets Spanish, Portuguese Speaking Users

IBM X-Force recently analyzed a new Android banking Trojan dubbed “Banker.BR” that appears to be targeting users in Spain, Portugal, Brazil and other parts of Latin America.

The post New Android Banking Trojan Targets Spanish, Portuguese Speaking Users appeared first on Security Intelligence.

Continue reading New Android Banking Trojan Targets Spanish, Portuguese Speaking Users

Android Enterprise Adds Flexibility But Still Calls for UEM Solutions

Android Enterprise simplifies device management and concretizes work and personal usage, but does not bring security to the legacy framework. Implementing a strong UEM solution can fill in the gaps.

The post Android Enterprise Adds Flexibility But Still Calls for UEM Solutions appeared first on Security Intelligence.

Continue reading Android Enterprise Adds Flexibility But Still Calls for UEM Solutions

7 Spring Cleaning Tasks to Improve Data Security

Data security is a daily essential, but spring cleaning offers an opportunity to check in on your current practices and make changes where necessary.

The post 7 Spring Cleaning Tasks to Improve Data Security appeared first on Security Intelligence.

Continue reading 7 Spring Cleaning Tasks to Improve Data Security

Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

It is important that gaming companies are prepared to defend against threats to their consumers and that gamers understand the types of threats they can face in their community.

The post Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers appeared first on Security Intelligence.

Continue reading Player vs. Hacker: Cyberthreats to Gaming Companies and Gamers

5G: Vast potential, but better security needed

5G security is top of mind for those who recognize that 5G is going to be higher risk. Fuzzing is one of the leading testing techniques for securing 5G.
The post 5G: Vast potential, but better security needed appeared first on Software Integrity Blog…. Continue reading 5G: Vast potential, but better security needed