HackDig : Dig high-quality web security articles for hacker

Privacy and Security Issues Found in Popular Shopping Apps

Just in time for Black Friday, Cyber Monday and the holiday shopping season, we investigated the most recent versions* of 30 of the leading, well-known mobile shopping applications to see how the application providers protect users from security and privacy risks.  The results based on our Advanced Application Analysis z3A technology are alarming: 100% of
Publish At:2019-11-20 12:25 | Read:145 | Comments:0 | Tags:App Security Mobile Security Android apps iOS mobile endpoin

Zimperium Analyzes TikTok’s Security and Privacy Risks

Several news outlets over the last few days are talking about how TikTok, the viral short video app where millions of teens post comedy skits set to music, is under fire from U.S. lawmakers.   CNN reports US lawmakers on both sides of the aisle warn that the app could pose a national security risk, and are calling on regulators and intelligence agencies to
Publish At:2019-11-12 00:25 | Read:191 | Comments:0 | Tags:App Security Mobile Threat Defense Android apps iOS mobile M

Security and Privacy Issues Found in Popular Travel Apps

Planned your holiday travel just yet? Too soon? Not according to experts who told The Today Show the best time to book your Thanksgiving AND Christmas travel plans are before Halloween. After Halloween, fares go up, layover possibilities increase as does ending up in the middle seat.  The truth is, whenever you book travel – and more of us are doing s
Publish At:2019-10-16 12:30 | Read:550 | Comments:0 | Tags:App Security Mobile Security Mobile Threat Defense Android a

Are Cash Transfer Apps Safe to Use? Here’s What Your Family Needs to Know

I can’t recall the last time I gave my teenage daughter cash for anything. If she needs money for gas, I Venmo it. A Taco Bell study break with the roommates? No problem. With one click, I transfer money from my Venmo account to hers. She uses a Venmo credit card to make her purchase. To this mom, cash apps may be the best thing to happen to parenting
Publish At:2019-09-19 23:20 | Read:528 | Comments:0 | Tags:Family Safety app security Apple Pay Cash App cash apps cash

What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the greatest return on their investment of
Publish At:2019-09-19 14:33 | Read:360 | Comments:0 | Tags:Android App Security iOS Mobile Malware Mobile Security Mobi

When to Use In-App Protection

There are more than 5 million apps in the app stores. Most of these apps fit into the gaming, business, education, lifestyle, entertainment, and utility app categories. Some of these apps have access to and contain highly sensitive data and require in-app protection and security to defend against real-time cyberattacks. This security is in addition to securi
Publish At:2019-09-19 14:33 | Read:236 | Comments:0 | Tags:App Security apps Mobile Banking zIAP

The Clicking Bot Applications

Cyber crime, like any crime, has its motives; each malware has its own malicious profit. Spyware spies on you. Ransomware demands a ransom to decrypt your private digital data. Phishing Malware phishes for your username, password or account numbers. Installation-fraud achieves fake software installations. Ad fraud fraudulently represents online advertisement
Publish At:2017-11-07 10:45 | Read:43716 | Comments:2 | Tags:Analysts Android App Security Mobile Malware Threat Research

Charger, the Most Costly Ransomware to Smartphone Users

Ransomware is evolving and becoming increasingly sophisticated, posing a greater threat to companies and private users alike. This malicious software has shown that it can propagate by using the viral mechanisms of a meme, that it can directly attack corporate servers, or even camouflage itself in false resumes. And now it has made its way to other devices,
Publish At:2017-03-29 12:55 | Read:4556 | Comments:0 | Tags:Security app security Ransomware smartphones

Application Security Testing: Resurgence of DAST for SDLC Integration and Scan Automation

Dynamic analysis security testing (DAST) works like a hacker-in-a-box, so to speak, by exploring and testing web applications and services via HTTP and HTTPS. DAST is one of the oldest automated application security testing (AST) techniques, tracing its roots to the mid-1990s. Since it interacts with live web applications and web services and automates hacke
Publish At:2017-01-20 19:45 | Read:4699 | Comments:0 | Tags:Application Security App Security Application Security Testi

Mirror, Mirror: Using Self-Protection to Boost App Security

Last week while reading to my toddler, I came across the story of “Snow White,” in which the evil queen consults a magic mirror to find her greatest threat, the fairest person in the land. While my kid fell asleep — probably due to my effective storytelling technique — I kept thinking about why the queen would want to identify that threat. The an
Publish At:2017-01-03 15:10 | Read:4476 | Comments:0 | Tags:Application Security Security Intelligence & Analytics App S

10 Application Security Testing Resources You Should Master and Share With Your Executive Team in 2017

Application Security Testing Takeaways From 2016 In my current role, I have the pleasure of routinely hearing our clients’ direct feedback regarding the application security issues they face. Across the board, they consistently refer to three main areas of concern: Securing executive buy-in and funding for major IT initiatives; Spending most of their
Publish At:2016-12-16 21:06 | Read:5126 | Comments:0 | Tags:Application Security Mobile Security Risk Management App Sec

Analysis of multiple vulnerabilities in AirDroid

By: Simone Margaritelli Follow Simone Margaritelli (@evilsocket)    Zimperium zLabs   Follow Zimperium zLabs (@zLabsProject) Analysis of multiple vulnerabilities in AirDroid Reported by: Simone Margaritelli Security Researcher at Zimperium zLabs Background AirDroid is a popular remote management tool for Android. It has an
Publish At:2016-12-01 14:35 | Read:6672 | Comments:0 | Tags:App Security Mobile security News Research AirDroid

Pokémon Go: the Security Cost of Catching ’em All

For the past two weeks, full-grown adults, college students and children have all been roaming around the country in search of Pokémon (gotta catch ’em all, right?). This augmented reality mobile phenomenon has removed people from their home and encouraged them to explore their neighborhoods, but catching them all has come at a cost: beyond the physical issu
Publish At:2016-08-03 02:00 | Read:3228 | Comments:0 | Tags:App Security Mobile Malware Mobile security pokemon

Mobile Banking Apps Are a Valuable Asset

Mobile banking is a killer mobile app. We can now easily move money from one account to another to pay bills, credit vendors and send cash to friends and family. In previous years these transactions required tellers, checks and nightly batch runs in the bank’s back office. Now with the ubiquity of mobile banking, customers expect this to happen at a moment’s
Publish At:2016-05-06 00:00 | Read:5276 | Comments:0 | Tags:App Security Mobile security banking bitcoin wallet

Mobile Device Management to Security: “I’m Not Dead Yet!”

“I can’t find my phone. It’s either inside a Hogwarts backpack at my son’s school, Penn Station in New York or traveling at 30,000 feet and accruing a ton of frequent flier miles.” How does a support call like this still account for 32 percent of mobile security incidents in 2015? Aren’t we in the age of apps? Isn’t
Publish At:2015-04-20 11:30 | Read:4387 | Comments:0 | Tags:Mobile Security App Security Bring-Your-Own-Device (BYOD) da

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud