Google Play Protect fails AV-Comparatives' anti-malware test

Google’s built-in malware protection for Android has failed a test conducted by security researchers at AV-Comparatives.

AV-Comparatives is an independent lab which tests anti-malware solutions against known malicious applications.

For its Android test, AV-Comparatives pitted security products from ten popular vendors against a test set of 3,601 malicious apps. 

A built-in security solution is somewhat expected to not perform as well as dedicated products, but Google Play Protect fell way behind...

By Ryan Daws, 30 July 2019, 0 comments. Categories: Android, Mobile, Platforms, Security.

Google will closely vet first-time Android developers for security

Google has announced plans to closely vet Android developers without a track record in a bid to boost platform security.

Android security has vastly improved since its early days but that hasn’t prevented some rogue developers from abusing Google’s platform.

Sameer Samat, VP of Android Product Management, wrote in a blog post:

“From the outset, we’ve sought to craft Android as a completely open...

By Ryan Daws, 16 April 2019, 2 comments. Categories: Android, App Stores, Industry, Mobile, Platforms, Security.

PWNED: Researcher uses broken API to print message on GPS watches

A German security researcher printed the word “PWNED!” on hundreds of GPS watches to prove a point about a broken API.

Christopher Bleckmann-Dreher discovered a vulnerability in an API used by Austrian GPS watch manufacturer Vidimensio.

The firm’s watches are used by a wide range of the population from the elderly down to children, and it affected over 20 models.

Dreher alerted Vidimensio to the problem but it was ignored for over a year. Given the potential for much greater risk in the...

By Ryan Daws, 03 April 2019, 0 comments. Categories: API, Hacking, Security.

Report: Open source breaches have increased by 71 percent

A report from Sonatype highlights that open source breaches have increased by a whopping 71 percent along with several other security findings.

This report is the largest DevOps survey conducted by Sonatype with 5,558 people sharing their views. Participants were from most of the major sectors but primarily in the technology and banking/financial industries.

Respondents’ primary reason for implementing security across the development lifecycle is for risk management (34.77%) purposes, followed by...

By Ryan Daws, 04 March 2019, 0 comments. Categories: Hacking, Industry, Security.

Apple revokes Facebook’s enterprise developer certificate

Apple has put Facebook on the naughty step and revoked its enterprise developer certificate following a data-snooping app scandal.

For those who expected Facebook’s apparent disregard for data privacy to have culminated with the Cambridge Analytica scandal of 2018, you may want to think again.

News broke yesterday that Facebook paid users as young as 13 to install a ‘research’ app that collects data of phone and web...

By Ryan Daws, 31 January 2019, 0 comments. Categories: Apple, Ethics, Facebook, Industry, Mobile, Platforms, Security.

Microsoft goes password-less through FIDO2 certification

Microsoft has enabled functionality for sign-on using either a FIDO2 device or biometric tool Windows Hello – thus potentially paving the way to kill off the password.

The move will mean users can more seamlessly sign in to a variety of applications, from Outlook, Skype and Office, to OneDrive, Cortana and Xbox Live.

Writing in a blog post confirming the move, Alex Simons,...

By Developer, 21 November 2018, 0 comments. Categories: Microsoft, Security.

Fortnite developer and Google have an Epic spat over vulnerability​​​​​​​

Fortnite developer Epic is not too pleased with the way in which Google publicly disclosed a security vulnerability with the game’s Android installer.

Rather than pay the 30 percent cut which Google takes from distributing games through its Play Store, Epic decided to bypass the official app store in favour of its own installer.

Sideloading games poses an increased risk to consumers as it bypasses many of...

By Ryan Daws, 28 August 2018, 0 comments. Categories: Android, Gaming, Hacking, Industry, Platforms, Security.

Google's new API improves biometric authentication in Android P

Google has announced a biometric authentication API which enables developers to improve the security of their apps.

Biometrics has become a favoured and quick security method for users. While there are certainly more secure methods of authentication, few are so fast and unintrusive.

Vishwath Mohan, Security Engineer at Google, wrote in a blog post:

“Biometric authentication mechanisms are becoming increasingly popular, and it's...

By Ryan Daws, 22 June 2018, 0 comments. Categories: Android, API, Hacking, Platforms, Security.

Microsoft and Google say they have found a fourth Meltdown-Spectre variant

Bad news, everyone. If you thought we were out of the woods when it comes to the Meltdown / Spectre CPU security flaws, then think again. Researchers from Microsoft and Google have identified a previously unknown fourth variant of the processor design issues that made front page news when they were discovered last year.

Like its predecessors, variant 4 (or CVE-2018-3639, to give its full name) describes a processor design issue that could allow malicious software to discover hidden information, such as a...

By William Judd, 22 May 2018, 0 comments. Categories: Hacking, Security.

Binary scans find vulnerabilities in one in five Android apps

Research conducted by binary-level security and compliance testing company Insignary has found vulnerabilities in one in five Android apps.

Insignary tested 700 of the most popular Android apps on the Google Play Store for the research. Their Clarity system was put to work for the first time analysing APKs for known open source vulnerabilities.

Here are some of the key findings:

  • The binary scans indicate that the Android apps available on Google Play Store by the top software vendors contain versions of open source components with security vulnerabilities. Out of the 700 APK files scanned, 136 contain security vulnerabilities.

  • 57% of the...

By Ryan Daws, 24 April 2018, 0 comments. Categories: Android, Platforms, Security.

Mimecast rolls out new API developer portal to extend business and cyber resilience

Email and data security provider Mimecast has rolled out a new application programming interface (API) developer portal to extend business and cyber resilience for email with a constant, scalable and uniform API.

The Mimecast API developer portal is already processing a huge number of requests every day and is a key enabler for multiple Mimecast services and applications. Mimecast customers and partners need to visit the portal to take advantage of Mimecast security and archive data and integrate to existing...

By Developer, 05 April 2018, 0 comments. Categories: API, Cloud, Security.

GitHub was hit with the world’s largest DDoS attack

It went down for five minutes.

Yes, unlike the last record-breaking DDoS attacks, which caused disruption to major services for days — GitHub was able to quickly mitigate the attack so that few users would have even been aware of the downtime.

The attack was launched on Wednesday last week and GitHub was unavailable from 17:21 to 17:26 UTC. In

By Ryan Daws, 02 March 2018, 0 comments. Categories: Development Tools, Git, Hacking, Industry, Platforms, Security.

ParseDroid vulnerabilities threatened most Android development tools

A collection of vulnerabilities known as ParseDroid put users of popular Android development tools at risk.

Research from Check Point has discovered several vulnerabilities in downloadable and cloud-based Android development tools which all Java/Android programmers use to build their companies business applications. Even security analysts and reverse-engineers use some of the affected softwares to conduct their work.

By Ryan Daws, 07 December 2017, 0 comments. Categories: Android, Development Tools, Security.

How can developers improve software security? Move to DevSecOps and ‘think like an attacker’

Developers today frequently find themselves between a rock and a hard place. The business may not place security at the top of its priorities, but we all know how vital it is – and in today’s agile and DevOps working environments, developers cannot afford to finish applications and then leave the tidying up to the security team.

A new report from Veracode issued today argues that while developers do care about security, and are getting better at it, more work still needs to be done –...

By James Bourne, 28 November 2017, 0 comments. Categories: Development Tools, Security.

The IoT spin cycle: Security challenges which continue to plague device manufacturers

In March this year, a curious issue was discovered on the Miele Professional PG 8528, a professional medical washer, that caught the attention of news outlets: “The corresponding embedded webserver "PST10 WebServer" typically listens to port 80 and is prone to a directory traversal attack;” the security flaw statement revealed, “therefore, an unauthenticated attacker may be able to exploit this issue to access sensitive information to aid in subsequent attacks. A Proof of...

By Adam Cecchetti, 20 October 2017, 0 comments. Categories: Devices, IoT, Security, Testing.

Report discusses how Java apps are susceptible to widespread attacks from known security defects

A recently released study conducted by CA Veracode has found that the majority of Java applications contain at least one vulnerable component, making them predisposed to widespread attacks.

The research, titled “2017 State of Software Security Report” - which involved CA Veracode’s base of more than 1,400 customers – revealed that less than 28% of companies conduct regular composition analysis to understand which components are built into their applications.

There were many...

By Developer, 19 October 2017, 0 comments. Categories: Java, Security.

Google launches security features while report shows iOS threats outpacing Android

Google has cracked down on security with the launch of Play Protect and other new defense mechanisms while a report has been released which shows iOS malware growth outpacing that of Android.

After the Google Docs phishing attack, the company has been ramping up its security in recent months. This started back in May with the implementation of machine learning to improve the detection of phishing messages – and the company now estimates it can block spam and malicious content with a 99.9 percent...

By Ryan Daws, 20 July 2017, 0 comments. Categories: Android, iOS, Platforms, Security.

Elastic Beam unveils AI-powered software platform to protect API infrastructures from attacks

Elastic Beam has announced the launch of API Behavioral Security (ABS), an artificial intelligence (AI)-powered software platform that can detect and block cyberattacks that target APIs to compromise corporate data and systems – in public clouds, hybrid clouds, or on premise.

ABS does not require any predefined policies, security rules, or attack signatures, and is capable of stopping new and constantly changing attacks.

Securing APIs is important because they provide an easy access into...

By Developer, 11 July 2017, 0 comments. Categories: API, Development Tools, Security.

Wetherspoons decided it’s safer to delete customer data

Pub chain JD Wetherspoons has quite a fanbase in the UK, but the company has decided it’s safer to delete all its customer data than risk it being hacked.

Several high-profile hacks in recent months have brought to light the seriousness of data leaks resulting from databases being hacked. Beyond the disrepute which can have an impact on future custom, individuals and companies also have to face a potential fine resulting from increasingly strict data protection regulations.

Wetherspoons’ decision...

By Ryan Daws, 30 June 2017, 0 comments. Categories: Security.