Vulnerability in Amazon Ring app allowed access to private camera recordings

A vulnerability in the Android version of the Ring app, which is used to remotely manage Amazon Ring outdoor (video doorbell) and indoor surveillance cameras, could have been exploited by attackers to extract users’ personal data and device’s dat… Continue reading Vulnerability in Amazon Ring app allowed access to private camera recordings

Issue in digital COVID-19 test could have allowed individuals to falsify results

WithSecure and Cue Health have worked together to address a security issue that WithSecure discovered in Cue’s COVID-19 test, which delivers the results of a nasal swab test via bluetooth to a mobile device. The issue could have allowed a subset of use… Continue reading Issue in digital COVID-19 test could have allowed individuals to falsify results

Which Third-Party Messenger App Is Best for Secure Business?

In October 2021, Facebook (now Meta), and all its platforms (Instagram, WhatsApp and Messenger) shut down across the globe for up to six hours, leaving billions without a messaging service. While Facebook engineers scrambled to fix the problem, users pivoted to other apps to stay connected. In the wake of the outage, Telegram added 70 […]

The post Which Third-Party Messenger App Is Best for Secure Business? appeared first on Security Intelligence.

Continue reading Which Third-Party Messenger App Is Best for Secure Business?

The impact of API security on how consumers view brands

ThreatX released the results of a survey which highlights the risk of API attacks on the consumer experience. Nearly every software application and mobile application uses, or is, an API. Attackers are increasingly focused on APIs and this focus pays o… Continue reading The impact of API security on how consumers view brands

The impact of API security on how consumers view brands

ThreatX released the results of a survey which highlights the risk of API attacks on the consumer experience. Nearly every software application and mobile application uses, or is, an API. Attackers are increasingly focused on APIs and this focus pays o… Continue reading The impact of API security on how consumers view brands

How mobile app usage data could reveal a person’s identity

The time a person spends on different smartphone apps is enough to identify them from a larger group in more than one in three cases say researchers, who warn of the implications for security and privacy. Psychologists Dr Heather Shaw, Professor Paul T… Continue reading How mobile app usage data could reveal a person’s identity

A 2022 priority: Automated mobile application security testing

The use of mobile devices has skyrocketed in the past two years and with it the mobile app market. It’s predicted mobile apps will generate more than $935 billion in revenue by 2023. Areas with growth potential, unfortunately, often attract the attenti… Continue reading A 2022 priority: Automated mobile application security testing

Online shopping at risk: Mobile application and API cyber attacks at critical high

Protecting mobile applications and APIs against automated threats is a top priority for online commerce businesses, according to data from a study published by DataDome. Conducted by Forrester Consulting, this survey of online commerce companies evalua… Continue reading Online shopping at risk: Mobile application and API cyber attacks at critical high

Mobile phishing exposure in the energy industry surged 161% in 2021

Mobile phishing exposure surged 161% within the energy industry between the second half of 2020 and the first half of 2021, a Lookout report reveals. The research indicates that organizations in the energy industry experienced the following between Jul… Continue reading Mobile phishing exposure in the energy industry surged 161% in 2021

WFH is here to stay: Five tactics to improve security for remote teams

When the pandemic took hold, most companies were forced to turn their employees into a fully operational remote workforce within the span of one week. And while some businesses have begun the transition to bring their teams back to offices, many have d… Continue reading WFH is here to stay: Five tactics to improve security for remote teams