Amazon launches Dash-based programmable IoT button – sells out within a day

(Image Credit: Amazon)

AWS (Amazon Web Services) is popular, the IoT is hot, and when you combine the two in a product for developers it sells out within a day. 

Based on the single button 'Dash' hardware by Amazon – which has been used in the past to order items with a button press – the AWS IoT version is a "Limited Release Programmable Dash Button" for developers to get started with AWS IoT, AWS Lambda, Amazon...

By Ryan Daws, 17 May 2016, 0 comments. Categories: Amazon, Cloud, Devices, Hacking, IoT.

Game Development: Managing the rules of the game

(Image Credit: iStockPhoto/Gladkikh)

The rules of the gaming industry are changing. In a highly-competitive market, game makers need to ensure they’re not only developing products which meets the needs of an increasingly demanding market, but that also stand up to the rigours of security. Be it online gaming or gambling, users are sharing sensitive data such as personal information or credit card details which means they...

By Gábor Marosvári, 21 April 2016, 0 comments. Categories: Gaming, Hacking, Security.

Software modification will soon be legalised

(Image Credit: Sam Howzit)

New rules have been issued by the Librarian of Congress to provide exemptions to the Digital Millennium Copyright Act (DMCA) which allows the use of modified software. This will legalise the popular act of "jailbreaking" on Apple devices, and the use of custom firmware on devices such as smartphones, tablets, and smart TVs. 

There...

By Ryan Daws, 28 October 2015, 0 comments. Categories: Hacking, Industry, Testing.

Risk-based security: Applying more sophisticated risk assessment and mitigation tools

(c)iStock.com/wolv

Not all data is created equal. Right there is why organisations are newly focused on risk based security where the crown jewels get more rigorous protection than, say, humdrum, ordinary files.

This is crucial because – as headlines about breaches of important data files at large insurers such as Anthem, large retailers such as Target, and even federal government agencies demonstrate – hackers have gotten very good at their jobs. Understand, for them this is a job. It’s no...

By Ciklum, 30 July 2015, 0 comments. Categories: Hacking, Security.

iOS 9 developers should "exclusively" use HTTPS

(Image Credit: iStockPhoto/Geebshot)

Apple has a lot of industry weight and can make or break technologies simply through putting their support behind them or ignoring altogether. As an example, their refusal to adopt Flash has quickened its inevitable demise, whilst their support of HTML5 has caused an uptick in usage across the web. 

During the Cupertino-based giant's developer conference last...

By Ryan Daws, 11 June 2015, 3 comments. Categories: Apple, Hacking, iOS.

Opinion: In the interest of public security…

(Image Credit: iStockPhoto/Bliznetsov)

It seems that in the aftermath of almost every major catastrophe comes a reaction from government to increase measures to enhance public security. The atrocities of 9/11 resulted in security measures ranging from increased airport checking procedures, to face recognition devices, from random searches of internet content by intelligence officers, to the use of wiretaps and the ability to intercept and read...

By Andrew Hull, 24 March 2015, 0 comments. Categories: Hacking, Industry, Security.

MoonPig's API breach could cost its business

(Image Credit: ©iStock.com/Tsekhmister)

Security breaches are frequent news, but fixes are often implemented with due haste to prevent data loss and protect customers. Paul Price, a security researcher, alerted MoonPig to a flaw in its API which allowed hackers to see payment information and view addresses. This fault was left unfixed for 17 months, and could be...

By Ryan Daws, 08 January 2015, 0 comments. Categories: API, Hacking, Security, Testing.

What issues does a Trusted Execution Environment address?

The richness of today’s connected devices such as smartphones, tablets, set-top boxes and televisions is bringing new challenges to service providers wanting to protect their offering against hackers and malware attacks. At the same time, an increasing number of applications are hosting sensitive, personal and confidential information that could have significant consequences if compromised. Such applications require more protection than can be offered by software solutions alone. This is where the...

By Global Platform, 10 December 2014, 0 comments. Categories: Hacking, Mobile, Monetisation, Security.