A Timeline of Mobile Vulnerabilities, Malware, Breaches, and Data Leaks
The events on this graph are of public mobile app breaches, leaks, and vulnerabilities. You can view the data with links to all of the sources here.
The events on this graph are of public mobile app breaches, leaks, and vulnerabilities. You can view the data with links to all of the sources here.
This data visualization is constructed with Google Data Studio using a dataset from Vice. Clink this link to view the interactive chart. Link to interactive chart Source: We Built a Database of Over 500 iPhones Cops Have Tried to Unlock
DevOps is a set of practices combining software development and information technology operations aiming to continuously deliver higher quality software in a shorter amount of time. It sounds easy. Your ability to do a better job in less time depends on how big or small your organization is and how many variables and constraints you …
This presentation describes the top five ways hackers attack mobile apps looking for secrets. It describes particular attacks, the tools used in the attacks, what specific information the bad actor hopes to obtain, and cites real-world examples of each of the attack methods. The presentation is a collection of dozens of stories and was constructed …
Marketers want to provide the most personalized experience to customers and prospects to increase conversions and revenue. If you make prospects feel like you really know them, then they will trust you and purchase products and services from you. There are hundreds of marketing automation and targeting systems to help you target very specific and …
This presentation provides details on development best practices, data leakage risk and security exposure for 45 Android mobile apps from the top US banks and mobile payment providers. The research displays vulnerabilities in consumer mobile banking apps and the correlating risk they introduce for banks and mobile users. This presentation was delivered at Droidcon SFO …
I had a teen learning how to drive and created an analogy of how teaching teen drivers to make good decisions is similar to your mobile apps in the wild. You can warn them both about the dangers but they are free to fail on their own. It’s interesting how risk affects auto insurance premiums …
Read more “Treat Your Mobile App Like You Treat Your Teenager”
This research details how both iOS and Android banking applications from the top 45 US banks and mobile payment providers fared for security and privacy risk.
Mobile Banking Apps are not Created Equal discloses the security and privacy risks exposure and whether or not each passes or fails the Open Web Application Security Project (OWASP) Mobile Top 10. This research details how both iOS and Android banking applications from the top 45 US banks and mobile payment providers fared for security …
I regret using my real phone #. …the hell. Tuesday I filled out a form on a lead generation landing page. The landing page is operated not by a specific product vendor but by an agency producing leads for others. Had I done a little more research, I would have realized this but alas, I …