Software modification will soon be legalised

(Image Credit: Sam Howzit)

New rules have been issued by the Librarian of Congress to provide exemptions to the Digital Millennium Copyright Act (DMCA) which allows the use of modified software. This will legalise the popular act of "jailbreaking" on Apple devices, and the use of custom firmware on devices such as smartphones, tablets, and smart TVs. 

There...

By Ryan Daws, 28 October 2015, 0 comments. Categories: Hacking, Industry, Testing.

iOS 9 developers should "exclusively" use HTTPS

(Image Credit: iStockPhoto/Geebshot)

Apple has a lot of industry weight and can make or break technologies simply through putting their support behind them or ignoring altogether. As an example, their refusal to adopt Flash has quickened its inevitable demise, whilst their support of HTML5 has caused an uptick in usage across the web. 

During the Cupertino-based giant's developer conference last...

By Ryan Daws, 11 June 2015, 2 comments. Categories: Apple, Hacking, iOS.

Opinion: In the interest of public security…

(Image Credit: iStockPhoto/Bliznetsov)

It seems that in the aftermath of almost every major catastrophe comes a reaction from government to increase measures to enhance public security. The atrocities of 9/11 resulted in security measures ranging from increased airport checking procedures, to face recognition devices, from random searches of internet content by intelligence officers, to the use of wiretaps and the ability to intercept and read...

By Andrew Hull, 24 March 2015, 0 comments. Categories: Hacking, Industry, Security.

MoonPig's API breach could cost its business

(Image Credit: ©iStock.com/Tsekhmister)

Security breaches are frequent news, but fixes are often implemented with due haste to prevent data loss and protect customers. Paul Price, a security researcher, alerted MoonPig to a flaw in its API which allowed hackers to see payment information and view addresses. This fault was left unfixed for 17 months, and...

By Ryan Daws, 08 January 2015, 0 comments. Categories: API, Hacking, Security, Testing.

What issues does a Trusted Execution Environment address?

The richness of today’s connected devices such as smartphones, tablets, set-top boxes and televisions is bringing new challenges to service providers wanting to protect their offering against hackers and malware attacks. At the same time, an increasing number of applications are hosting sensitive, personal and confidential information that could have significant consequences if compromised. Such applications require more protection than can be offered by software solutions alone. This is where the...

By Global Platform, 10 December 2014, 0 comments. Categories: Hacking, Mobile, Monetisation, Security.

Bitcasa to be hacked at Apps World North America

Bitcasa is challenging developers to come up with new and innovative ways to leverage its cloud storage platform at the upcoming Apps Hackfest in San Francisco.

The cloud storage platform is inviting Hackfest participants to use the Bitcasa API to create a useful and easy way to drop and drag anything into a Bitcasa Drive. For example, a Go Pro plugin; an IFTTT-like automation; or a mobile app that collects and shares your favourite digital stuff.

The Bitcasa REST API provides a plug-and-play file system for...

By Jon Chang, 04 February 2014, 0 comments. Categories: Development Tools, Hacking.

How SASS can rescue front-end developers

In a nutshell: What is SASS? SASS is a CSS pre-processor which helps developers simplify complex stylesheet requirements. It's designed to cut out repetitive tasks, speed up your workflow and help organise your styles – read on for three quick tips explaining the do's and don'ts of using it in your projects... 1) Nest is best Problem You find yourself endlessly repeating parent selectors to target child elements. You're going against the DRY (do not repeat yourself) methodology. Solution Nesting is one of the most immediately obvious benefits of SASS. It enables you to organise your styles hierarchically and cut down on repetitive coding, using a familiar nesting pattern to group your selectors together. Beware It's easy to get carried away with nesting but as a general rule of thumb keep it within three levels. If...

By Kat Barstow, 19 December 2013, 0 comments. Categories: Development Tools, Hacking, Languages.

Microsoft settles 3,265 piracy cases, yet allows 100 fake Windows 8 apps

In two ‘yin and yang’ stories breaking this week, Microsoft has settled 3,265 software piracy cases across 43 different countries, yet Redmond allows “over 100” fake apps into the Windows Store which shipped alongside the latest iteration of its OS.

Let’s start with the good news; a software company as big as Microsoft is bound to get tied up in all kinds of lawsuit battles, and the last fiscal year was a hefty one.

Although keeping busy settling the 3,265 cases, the most...

By Ryan Daws, 10 July 2013, 1 comment. Categories: Development Tools, Hacking, Industry, Platforms, Security, Windows.

Oracle looking to improve Java security

Oracle’s Java, in its current form, is hardly the most secure of platforms. With huge breaches and exploits seemingly every week; the firm is looking to improve security.

The latest tactic by cybercriminals tricks users into running malicious code through a “signed” applet.

 

A website belonging to Chemnitz University of Technology in Germany was the latest found to be infected with the “g01pack”...

By Ryan Daws, 31 May 2013, 0 comments. Categories: Android, Development Tools, Enterprise, Hacking, Languages, Platforms, Security, Testing.