Checkmarx Research: SoundCloud API Security Advisory

Recently, the Checkmarx Security Research team investigated the online music platform SoundCloud. According to their website, “As the world’s largest music and audio platform, SoundCloud lets people discover and enjoy the greatest selection… Continue reading Checkmarx Research: SoundCloud API Security Advisory

[Webinar] Mobile application hardening for business-critical apps

Mobile apps often protect themselves via internally developed controls and commercial products. Learn about how some controls work and how to sidestep them.
The post [Webinar] Mobile application hardening for business-critical apps appeared first on S… Continue reading [Webinar] Mobile application hardening for business-critical apps

The Role of Evil Downloaders in the Android Mobile Malware Kill Chain

Malware on official mobile app stores is a growing concern for all users. Increasingly, malware developers are getting around sophisticated app store controls by using mobile malware downloaders.

The post The Role of Evil Downloaders in the Android Mobile Malware Kill Chain appeared first on Security Intelligence.

Continue reading The Role of Evil Downloaders in the Android Mobile Malware Kill Chain

How Attackers Could Hijack Your Android Camera to Spy on You

This blog was co-authored by Pedro Umbelino, Senior Security Researcher, Checkmarx. Introduction In today’s digitally-connected society, smartphones have become an extension of us. Advanced camera and video capabilities in particular are playing … Continue reading How Attackers Could Hijack Your Android Camera to Spy on You

Kotlin Guide: Why We Need Mobile Application Secure Coding Practices

October is the annual National Cybersecurity Awareness Month (NCSAM), which is promoted by the U.S. Department of Homeland Security and the National Initiative for Cybersecurity Careers and Studies (NICCS). According to the NICCS, “Held every Oct… Continue reading Kotlin Guide: Why We Need Mobile Application Secure Coding Practices

The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019

This year, National Cyber Security Awareness Month focuses on a trifecta of themes: Own IT, Secure IT and Protect IT.

The post The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019 appeared first on Security Intelligence.

Continue reading The IT Trifecta: An Overview of National Cyber Security Awareness Month 2019

How to Reduce the Risk Posed by Vulnerable Mobile Apps

With so many risky mobile apps out there, one way of reducing this risk is to start looking into your BYOD practices and determining if they make sense for your organization.

The post How to Reduce the Risk Posed by Vulnerable Mobile Apps appeared first on Security Intelligence.

Continue reading How to Reduce the Risk Posed by Vulnerable Mobile Apps

Enterprise Mobility Management Gets Personal

Enterprise mobility management (EMM) is widely adopted, but security leaders still struggle to enroll BYOD and other user-centric models.

The post Enterprise Mobility Management Gets Personal appeared first on Security Intelligence.

Continue reading Enterprise Mobility Management Gets Personal

Qualcomm Critical Flaw Exposes Private Keys For Android Devices

A side-channel attack in Qualcomm technology, which is used by most modern Android devices, could allow an attacker to snatch private keys. Continue reading Qualcomm Critical Flaw Exposes Private Keys For Android Devices

Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore?

Do you remember your first mobile phone, and the newfound feelings of connectedness and convenience that came with it? Nowadays, are these devices really phones or are they computers? Labels matter.

The post Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore? appeared first on Security Intelligence.

Continue reading Mobile Security Versus Desktop and Laptop Security: Is There Even a Difference Anymore?