Application security initiatives and programs are getting good at getting down to where an organization’s data lives and protecting it against threats, but that is only one piece of the security puzzle. With limited amounts of time, resources and people available to tackle security, organizations have had to prioritize what gets protected. “For instance, an … continue reading
As passwords continue to be a problem in today’s modern world, one group of computer researchers is taking a new approach to protecting the web. Researchers from Florida International University and Bloomberg have developed a two-factor authentication solution that depends on physical objects rather than code. We use passwords to unlock sensitive information such as … continue reading
Researchers say they have found the biggest Android security flaws known to date. The vulnerabilities, nestled inside Android’s media playback library Stagefright, are said to affect 950 million Android devices, which amounts to 95% of them. Mobile security researcher Joshua J. Drake, vice president of platform research and exploitation at Zimperium zLabs, discovered the vulnerabilities … continue reading
Mikeal Rogers, a developer on the io.js team and an active member of the Node community, has posted a proposal on GitHub for reconciliation of the io.js fork with Node.js. Rogers posted an open GitHub proposal entitled “Reconciliation Proposal #978,” laying out preliminary plans for the merger, the technical governance structure, proposed working groups, and … continue reading
The National Institute of Standards and Technology (NIST) wants to protect users from their mobile devices. The organization has released a new guide designed to improve the security of mobile devices. While mobile applications have helped businesses increase productivity through real-time communication and connectivity, the benefits don’t outweigh the risks that can come with it, … continue reading
Developers should guard apps against phishing, while app stores see more malware infiltration … continue reading