Game Development: Managing the rules of the game

(Image Credit: iStockPhoto/Gladkikh)

The rules of the gaming industry are changing. In a highly-competitive market, game makers need to ensure they’re not only developing products which meets the needs of an increasingly demanding market, but that also stand up to the rigours of security. Be it online gaming or gambling, users are sharing sensitive data such as personal information or credit card details which means they...

By Gábor Marosvári, 21 April 2016, 0 comments. Categories: Gaming, Hacking, Security.

HTML5 security: Cross domain messaging

(c)iStock.com/Miha Perosa

HTML5 is one of the emerging technologies for next generation web applications and has brought a lot of new features to the web. HTML5 applications are also widely used in the mobile app world. But along with the features, HTML5 has brought various new attack vectors as well.

Before going ahead with the security concepts of cross domain messaging, let us understand the basics of how cross domain messaging is implemented in HTML5.

Cross domain messaging

Due to the same origin policy...

By Srinivas, 27 January 2016, 0 comments. Categories: Development Tools, HTML5, Security.

Oracle's new API deals with Java EE security problems

(Image Credit: iStockPhoto/Hramovnick)

Oracle's staff are fully-aware that security in Java EE hasn't been taken as seriously as it should have, but are working to fix these problems in the new Java EE security API (JSR 375) which is a proposal for baking better security into the environment. 

Java's development environment is notorious when it comes to security problems, at...

By Ryan Daws, 06 November 2015, 0 comments. Categories: API, Java, Security.

Risk-based security: Applying more sophisticated risk assessment and mitigation tools

(c)iStock.com/wolv

Not all data is created equal. Right there is why organisations are newly focused on risk based security where the crown jewels get more rigorous protection than, say, humdrum, ordinary files.

This is crucial because – as headlines about breaches of important data files at large insurers such as Anthem, large retailers such as Target, and even federal government agencies demonstrate – hackers have gotten very good at their jobs. Understand, for them this is a job. It’s no...

By Ciklum, 30 July 2015, 0 comments. Categories: Hacking, Security.

IoT and the enterprise: What has the industry got to do to kick-start growth?

(c)iStock.com/Danil Melekhin

The analysts and researchers are in agreement; the Internet of Things (IoT) market will become the largest device market in the world. The question is simply when.

Berg Insight argues that in the industrial automation sector, the number of wireless IoT devices will hit 43.5 million by 2020. In the overall market, the numbers are almost frighteningly big: BI...

By James Bourne, 12 June 2015, 0 comments. Categories: Enterprise, IoT, Security.

The privacy implications of the Internet of Things

(c)iStock.com/alengo

The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected to the Internet to facilitate household activities. In this context, it is worth mentioning that refrigerators that allow the users to access the Internet are already commercially available.

According to ABI Research, a...

By Daniel Dimov, 04 June 2015, 0 comments. Categories: IoT, Security.

Opinion: In the interest of public security…

(Image Credit: iStockPhoto/Bliznetsov)

It seems that in the aftermath of almost every major catastrophe comes a reaction from government to increase measures to enhance public security. The atrocities of 9/11 resulted in security measures ranging from increased airport checking procedures, to face recognition devices, from random searches of internet content by intelligence officers, to the use of wiretaps and the ability to intercept and read...

By Andrew Hull, 24 March 2015, 0 comments. Categories: Hacking, Industry, Security.