hacking
Detecting and Preventing Android Security Risks Even though the Android app development process involves thorough verification, there has been no preventing new malware from being developed. Here are some of the most common potential security risks Android users should watch out for, as well as some measures to take to protect your smartphone, data, and privacy. |
||
The Potential for DevOps in Fighting Cyber Warfare Government hacking incidents have put cyber warfare in the news. DevOps actually presents an interesting arsenal. With DevOps, your systems have excellent environment monitoring and are cryptographically verifiable such that the slightest penetration or unauthorized change is immediately detected. |
||
Can Bug Bounty Programs Replace In-House Testing? Large companies have long used bug bounty programs to find vulnerabilities in their software, but these initiatives are becoming increasingly common among individual developers, too. Should a small business use a bug bounty program? And could it even replace their in-house testing? Should it? |
||
Apple Pay's Security Concerns Holding It Back Apple Pay might be simple and easy to use, but the number of people in the US who distrust mobile payment systems due to the degree of personal information that needs to be shared increased by 9 percent year-over-year, bringing it to 35 percent. Security issues are holding the app back. |
||
US Military’s Social Media Accounts Hacked The US military command’s Twitter and YouTube accounts were hacked recently. Though the episode essentially amounted to little more than an annoyance, it should lead to an investigation into whether there are any more vulnerabilities in the administration's online accounts and profiles. |
||
Keeping One Step Ahead of Cloud Hackers Cloud systems are tempting targets for hackers because a single successful breach can steal information from multiple companies. To keep one step ahead of hackers, you need to understand what you can protect, where you might lose visibility, and where you need to apply extra security assurance. |
||
Who Should Be Testing? New Considerations after Security Breaches Debates arise when people start talking about where a particular IT function should be performed. Executives can act as if testing is a necessary evil and cost is the only important factor. But due to recent security breaches, companies should be more concerned with comprehensive testing than cost. |
||
Doing Our Part to Contain Point-of-Sale Data Theft It’s easy for us as software developers and testers to dismiss intrusions on point-of-sale systems as the fault of network security professionals or inadequate network defenses. The reality is that there is a lot we should be doing as well on the software side to prevent these kinds of attacks. |