Streamline your IT mobile app delivery pipeline

Discover the best practices to get your mobile apps out of your developers’ hands and into production with the proven, repeatable process in this article.
The post Streamline your IT mobile app delivery pipeline appeared first on TechRepublic.
Continue reading Streamline your IT mobile app delivery pipeline

Google Play apps will allow users to initiate in-app account deletion

Google Play will be pushing Android app developers to allow users to delete their account and associated data from within the app. Users will also be given the option to only delete data where applicable, as some data needs to be retained for security,… Continue reading Google Play apps will allow users to initiate in-app account deletion

Survey reveals surprising Mac user app preferences and purchasing trends

Setapp’s new Mac apps survey finds the features Mac users seek as well as how and why they purchase software the ways in which they do.
The post Survey reveals surprising Mac user app preferences and purchasing trends appeared first on TechRepublic.
Continue reading Survey reveals surprising Mac user app preferences and purchasing trends

Predatory loan mobile apps grab data, harass users and their contacts

Lookout researchers have discovered nearly 300 Android and iOS apps that trick victims into unfair loan terms, exfiltrate excessive user data from mobile devices, and then use it to pressure and shame the victims for repayment. Aimed at consumers in de… Continue reading Predatory loan mobile apps grab data, harass users and their contacts

Malicious droppers on Google Play deliver banking malware to victims

Android users are often advised to get mobile apps from Google Play, the company’s official app marketplace, to minimize the possibility of downloading malware. After all, Google analyzes apps before allowing them on the market. Unfortunately, ti… Continue reading Malicious droppers on Google Play deliver banking malware to victims

Risk management focus shifts from external to internal exposure

Coalfire released its fourth annual Securealities Penetration Risk Report which analyzes enterprise and cloud service providers (CSPs) internal and external attack vectors, application development and mobile app security, social engineering and phishin… Continue reading Risk management focus shifts from external to internal exposure

Vulnerability in Amazon Ring app allowed access to private camera recordings

A vulnerability in the Android version of the Ring app, which is used to remotely manage Amazon Ring outdoor (video doorbell) and indoor surveillance cameras, could have been exploited by attackers to extract users’ personal data and device’s dat… Continue reading Vulnerability in Amazon Ring app allowed access to private camera recordings

Issue in digital COVID-19 test could have allowed individuals to falsify results

WithSecure and Cue Health have worked together to address a security issue that WithSecure discovered in Cue’s COVID-19 test, which delivers the results of a nasal swab test via bluetooth to a mobile device. The issue could have allowed a subset of use… Continue reading Issue in digital COVID-19 test could have allowed individuals to falsify results

Which Third-Party Messenger App Is Best for Secure Business?

In October 2021, Facebook (now Meta), and all its platforms (Instagram, WhatsApp and Messenger) shut down across the globe for up to six hours, leaving billions without a messaging service. While Facebook engineers scrambled to fix the problem, users pivoted to other apps to stay connected. In the wake of the outage, Telegram added 70 […]

The post Which Third-Party Messenger App Is Best for Secure Business? appeared first on Security Intelligence.

Continue reading Which Third-Party Messenger App Is Best for Secure Business?