Pressure to rapidly launch apps is causing security problems
(Image Credit: iStockPhoto/weerapatkiatdumrong)
In a world that's growing ever more reliant on apps, the rapid pace at which they're being developed and deployed is causing significant problems with security, according to a new report.
The report, Application Security in the Changing Risk Landscape, was undertaken by the Ponemon...
Google steps-up Android security with App Security Program
(Image Credit: iStockPhoto/iunderhill)
Google has deployed a range of efforts to improve Android security over the past few years, but today’s announcement of the 'Google Play App Security Improvement Program' could be its most important.
When you consider insecure operating...
Game Development: Managing the rules of the game
(Image Credit: iStockPhoto/Gladkikh)
The rules of the gaming industry are changing. In a highly-competitive market, game makers need to ensure they’re not only developing products which meets the needs of an increasingly demanding market, but that also stand up to the rigours of security. Be it online gaming or gambling, users are sharing sensitive data such as personal information or credit card details which means they...
HTML5 security: Cross domain messaging
HTML5 is one of the emerging technologies for next generation web applications and has brought a lot of new features to the web. HTML5 applications are also widely used in the mobile app world. But along with the features, HTML5 has brought various new attack vectors as well.
Before going ahead with the security concepts of cross domain messaging, let us understand the basics of how cross domain messaging is implemented in HTML5.
Cross domain messaging
Due to the same origin policy...
Oracle's new API deals with Java EE security problems
(Image Credit: iStockPhoto/Hramovnick)
Oracle's staff are fully-aware that security in Java EE hasn't been taken as seriously as it should have, but are working to fix these problems in the new Java EE security API (JSR 375) which is a proposal for baking better security into the environment.
Java's development environment is notorious when it comes to security problems, at...
Risk-based security: Applying more sophisticated risk assessment and mitigation tools
Not all data is created equal. Right there is why organisations are newly focused on risk based security where the crown jewels get more rigorous protection than, say, humdrum, ordinary files.
This is crucial because – as headlines about breaches of important data files at large insurers such as Anthem, large retailers such as Target, and even federal government agencies demonstrate – hackers have gotten very good at their jobs. Understand, for them this is a job. It’s no...
IoT and the enterprise: What has the industry got to do to kick-start growth?
The analysts and researchers are in agreement; the Internet of Things (IoT) market will become the largest device market in the world. The question is simply when.
Berg Insight argues that in the industrial automation sector, the number of wireless IoT devices will hit 43.5 million by 2020. In the overall market, the numbers are almost frighteningly big: BI...
The privacy implications of the Internet of Things
The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected to the Internet to facilitate household activities. In this context, it is worth mentioning that refrigerators that allow the users to access the Internet are already commercially available.
According to ABI Research, a...
Opinion: In the interest of public security…
(Image Credit: iStockPhoto/Bliznetsov)
It seems that in the aftermath of almost every major catastrophe comes a reaction from government to increase measures to enhance public security. The atrocities of 9/11 resulted in security measures ranging from increased airport checking procedures, to face recognition devices, from random searches of internet content by intelligence officers, to the use of wiretaps and the ability to intercept and read...