HackDig : Dig high-quality web security articles for hacker

The Clicking Bot Applications

Cyber crime, like any crime, has its motives; each malware has its own malicious profit. Spyware spies on you. Ransomware demands a ransom to decrypt your private digital data. Phishing Malware phishes for your username, password or account numbers. Installation-fraud achieves fake software installations. Ad fraud fraudulently represents online advertisement
Publish At:2017-11-07 10:45 | Read:39472 | Comments:2 | Tags:Analysts Android App Security Mobile Malware Threat Research

Charger, the Most Costly Ransomware to Smartphone Users

Ransomware is evolving and becoming increasingly sophisticated, posing a greater threat to companies and private users alike. This malicious software has shown that it can propagate by using the viral mechanisms of a meme, that it can directly attack corporate servers, or even camouflage itself in false resumes. And now it has made its way to other devices,
Publish At:2017-03-29 12:55 | Read:4347 | Comments:0 | Tags:Security app security Ransomware smartphones

Application Security Testing: Resurgence of DAST for SDLC Integration and Scan Automation

Dynamic analysis security testing (DAST) works like a hacker-in-a-box, so to speak, by exploring and testing web applications and services via HTTP and HTTPS. DAST is one of the oldest automated application security testing (AST) techniques, tracing its roots to the mid-1990s. Since it interacts with live web applications and web services and automates hacke
Publish At:2017-01-20 19:45 | Read:4180 | Comments:0 | Tags:Application Security App Security Application Security Testi

Mirror, Mirror: Using Self-Protection to Boost App Security

Last week while reading to my toddler, I came across the story of “Snow White,” in which the evil queen consults a magic mirror to find her greatest threat, the fairest person in the land. While my kid fell asleep — probably due to my effective storytelling technique — I kept thinking about why the queen would want to identify that threat. The an
Publish At:2017-01-03 15:10 | Read:4210 | Comments:0 | Tags:Application Security Security Intelligence & Analytics App S

10 Application Security Testing Resources You Should Master and Share With Your Executive Team in 2017

Application Security Testing Takeaways From 2016 In my current role, I have the pleasure of routinely hearing our clients’ direct feedback regarding the application security issues they face. Across the board, they consistently refer to three main areas of concern: Securing executive buy-in and funding for major IT initiatives; Spending most of their
Publish At:2016-12-16 21:06 | Read:4817 | Comments:0 | Tags:Application Security Mobile Security Risk Management App Sec

Analysis of multiple vulnerabilities in AirDroid

By: Simone Margaritelli Follow Simone Margaritelli (@evilsocket)    Zimperium zLabs   Follow Zimperium zLabs (@zLabsProject) Analysis of multiple vulnerabilities in AirDroid Reported by: Simone Margaritelli Security Researcher at Zimperium zLabs Background AirDroid is a popular remote management tool for Android. It has an
Publish At:2016-12-01 14:35 | Read:6438 | Comments:0 | Tags:App Security Mobile security News Research AirDroid

Pokémon Go: the Security Cost of Catching ’em All

For the past two weeks, full-grown adults, college students and children have all been roaming around the country in search of Pokémon (gotta catch ’em all, right?). This augmented reality mobile phenomenon has removed people from their home and encouraged them to explore their neighborhoods, but catching them all has come at a cost: beyond the physical issu
Publish At:2016-08-03 02:00 | Read:3000 | Comments:0 | Tags:App Security Mobile Malware Mobile security pokemon

Mobile Banking Apps Are a Valuable Asset

Mobile banking is a killer mobile app. We can now easily move money from one account to another to pay bills, credit vendors and send cash to friends and family. In previous years these transactions required tellers, checks and nightly batch runs in the bank’s back office. Now with the ubiquity of mobile banking, customers expect this to happen at a moment’s
Publish At:2016-05-06 00:00 | Read:5021 | Comments:0 | Tags:App Security Mobile security banking bitcoin wallet

Mobile Device Management to Security: “I’m Not Dead Yet!”

“I can’t find my phone. It’s either inside a Hogwarts backpack at my son’s school, Penn Station in New York or traveling at 30,000 feet and accruing a ton of frequent flier miles.” How does a support call like this still account for 32 percent of mobile security incidents in 2015? Aren’t we in the age of apps? Isn’t
Publish At:2015-04-20 11:30 | Read:4187 | Comments:0 | Tags:Mobile Security App Security Bring-Your-Own-Device (BYOD) da

Dating Apps and Corporate Directories: Dr. Sleuthe Eistheimer’s New Social Security Productivity Powered by Grumpy Cat

Apps store countless types of information about our lives, both personal and professional. According to renowned Internet-accredited work/life specialist Dr. Sleuthe Eistheimer, the information is being wasted at the corporate level. “Apps have become the new software, but at a much more miniaturized level… and connected to the Internet,” h
Publish At:2015-04-01 17:05 | Read:3916 | Comments:0 | Tags:Application Security Mobile Security App Security Cybersecur

Q&A: Assessing and Addressing Enterprise App Security

As app use rapidly matures and moves into the enterprise to share all data across all devices, attacks on mobile have grown just as exponentially in volume and scale. The top apps on the Apple App Store and Google Play have seen significant cyberattacks, with 87 percent of iOS’s and 97 percent of Android’s top 100 paid apps victimized by hacks. W
Publish At:2015-03-06 00:20 | Read:4228 | Comments:0 | Tags:Application Security App Security Cybersecurity MaaS360 Mobi

Mobile Ad Networks Puncture Your Personal Defenses

Tired of pesky ads popping up while you’re using your favorite mobile apps? That should be the least of your worries. As it turns out, mobile ad networks and affiliate programs are unknowingly advertising much more than they bargained for. In fact, the code used by advertisers and other third parties for mobile tracking can be exploited to provide attackers
Publish At:2015-01-27 11:40 | Read:4203 | Comments:0 | Tags:Consumer Mobile Security app security McAfee Mobile Security

Every Step You Take, Every Call You Make: Is Your Phone Watching You?

Imagine a world where every mobile move you make – each text message and phone call – is broadcast to complete strangers. A world where owning a mobile device means giving up your right to personal privacy. Unfortunately with the recent Signaling System 7 (SS7) research that has come to light, it appears that this world already exists – and we’re living in i
Publish At:2015-01-14 01:25 | Read:3000 | Comments:0 | Tags:Consumer Mobile Security app security McAfee Mobile Security

WhatsApp with End-to-End Encryption?

Throughout the past year, many mobile messaging apps have come under fire for inherent security vulnerabilities. This month, WhatsApp (one of the largest globally used messaging apps) has gone to great lengths to ensure users’ personal data is protected. Their recent deployment of end-to-end encryption, one of the largest to date, poses the question: is the
Publish At:2014-12-16 21:40 | Read:3493 | Comments:0 | Tags:Consumer Mobile Security app security McAfee Mobile Security

IoT and App Dev Security: Where Are We Now?

The images of an Internet of Things (IoT) app world are iconic, futuristic and real. Trees kitted out with low-water sensors; cars that can alert drivers to less congested traffic routes and free parking spaces; and manufacturing shop floors where machines sense low inventory and automatically order replacements are all examples of the IoT. At the core of th
Publish At:2014-12-01 23:40 | Read:5466 | Comments:0 | Tags:Application Security App Security Application Development (A


Share high-quality web security related articles with you:)


Tag Cloud