Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2022

Your Ultimate Social Media Security Checklist [2022 Updated]

Social media is both a boon and a bane. While it has connected billions of people, made them more accessible, and created more possibilities for the end-users. There's no doubt that it has also made them more susceptible to security threats and vulnerabilities. According to We Are Social, there are around 4.62 billion active social media users worldwide. This is precisely the very reason why cyber criminals love social media as well.

Microsoft Discovers Security Flaws In Pre-installed Android Apps

Four high-severity vulnerabilities have been exposed to the framework used by pre-installed Android system apps with millions of downloads. Fixed by Israeli developer MCE Systems, this issue could allow an attacker to launch remote and local attacks or be used as a vector to exploit extensive system privileges to obtain sensitive information. Here’s what Microsoft 365 Defender Research Team had to say about it.

Webinar: How an insecure mobile app can tarnish your company's reputation

About The Webinar: Today’s cybersecurity threat landscape is highly challenging. Attackers are constantly on the lookout to exploit security vulnerabilities in applications and systems to gain access to or control sensitive information and launch cyberattacks such as ransomware. With companies spreading sensitive data across different platforms, software as a service (SaaS) platforms, containers, service providers, and even various cloud platforms, it’s essential that they begin to take a more proactive approach to security.

China's New Mobile App Rules - Cybersecurity Updates 2022

The Chinese government took down over 2 million applications from Chinese app stores in just two years (2018-2020)! Now, the government has revised and published stricter cybersecurity updates or provisions for mobile app development, which will go into effect from August 1st, 2022. Why is this happening, and what does the new policy say? Also, how does it affect the developers within China? If you have these questions on your mind, this blog is for you.

Australia Recorded the Highest Rate of iOS & Android App Threats

Navigating the internet in 2022 is more dangerous than ever for Australian netizens. The risks to the privacy of Australian customers are at an all-time high, as the nation has reported the highest percentage of mobile threats globally, standing at 26.9%. The average Australian netizen uses web-based mobile apps to browse, entertain, communicate, and shop online.

Your Ultimate Guide to Black Box, Grey Box and White Box Testing

Are you looking about getting a penetration test done, but you're not sure what kind of test to get. If you are an IT consulting company, you must have heard about black-box, grey-box, and white-box testing. The following are some of the most common questions asked when it comes to selecting the type of testing: Consider the advantages and disadvantages of black box, grey box, and white box testing.

Top 10 Security Issues in Mobile App Development

As a mobile app developer, you must develop and release fully functional and safe applications. While you can manage the functionality quite comfortably, making the application secure and resilient to cyber-attacks is hard. So, what should you do? Well, we got you covered. This blog discusses the top 10 security issues developers encounter during mobile app development and the solutions.

Protect your Business with Enterprise Mobile Security in 2022

If you are not taking enterprise mobile security seriously, look at these stats: According to the State of Enterprise Mobile Security 2022 Report, 75% of the analyzed phishing sites targeted mobile devices. The same report stated that 30% of the total zero-day vulnerabilities discovered in 2021 targeted mobile devices. Security week states that mobile phishing attacks have increased at a consistent rate of 85% since 2011.

South Africa's POPIA vs. EU's GDPR: What You Need to Know

It's been a while; there has been a debate between GDPR and POPIA. Both compliances have made quite a mark since their inception. The South African Protection of Personal Act, also known as POPIA, means to provide South African citizens control over their data. It also makes all organizations processing the personal information in South Africa legally responsible to protect the data.

Recent Developments in Data Security Laws in Africa

The pandemic has caused havoc on business and personal lives. It also highlighted the importance of personal data and its vulnerability. To combat this, governments across the globe have reviewed and modulated their privacy laws and regulations. Including the African governments and legislators. Over the recent years, Internet usage has increased significantly on the African continent. The usage was aided by continued investment in local digital infrastructure and improved user access.