Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Appknox

Mobile App Security & Google's Data Safety Launch - Yay or Nay?

Internet and software giant Google recently recalibrated how it categorizes its Playstore apps. Google's Android applications are tagged with 'nutrition labels' based on the security practices and the data they collect from users to share with third parties. The recently announced Google Play's Data Safety section goes into action from July 20th.

How To Protect Your Code: Top 3 Anti-Debugging Methods

Threat actors utilize numerous anti-analysis techniques, one of the most common of which is Anti-Debugging, to make post-detection analysis more difficult. In the malware they create and the ways they use to avoid detection and analysis by cybersecurity experts and solutions, threat actors have shown to be more inventive.

Root Detection Techniques

Phone manufacturers and mobile network operators often implement stringent software restrictions for security reasons. However, these constraints can be circumvented by rooting your Android phone. Rooting is the process of gaining access to more administrative-level controls on an Android device. Despite its benefits, attackers often use rooting to target sensitive user and business data. According to security experts, 36 out of 1000 Android devices are rooted globally.

PGP Decryption Bypass in Flutter Application

During the assessment of one of the financial applications built upon the flutter framework, we came across that the application was using PGP encryption for encrypting the API requests. It is pretty common for financial applications to be implementing traffic encryption, with AES seen to be the preferred algorithm for encrypting traffic. There is plenty of research already available on decrypting AES encrypted traffic.

Key Attributes You Need to Consider When Selecting a Cloud Security Platform

As more and more businesses move towards cloud-based operations and embrace digital transformation, security is increasingly becoming an important question. As an enterprise migrates to the cloud, its assets and data resources need to be migrated as well, and that might expose the sensitive information.

Do You Think Outsourcing for Mobile App Security Would Be a Wise Decision

For businesses who are looking to enhance profits and boost their global footprint, mobile app development and app security have become a top priority. With the smartphone industry still flourishing, it's evident that this trend won't be going away anytime soon, especially as market competition is increasing and new interactive technology becomes more prevalent. Mobile apps are expected to earn over $935 billion in revenue by 2023, according to Statista.

Top 7 Security Measures That Payment Gateways Use

Handling sensitive data, compliance, and security is always front of mind for payment gateways. Technology is nowadays a double-edged sword. Just as digital advancement has revolutionized global commerce, so too have the tactics that cybercriminals use to defraud merchants and customers. A study by PWC, Global Economic Crime and Fraud Survey 2020, found that 47% of respondent companies experienced some form of fraud, resulting in US$42B of losses.

12 Best DevSecOps Practices Your Tech Team Should Know About

For modern IT firms, developing secure software while meeting the market speed and scale needs has always been a paradox. Because of the fear of lagging behind in terms of speed to market, more than 52% of the businesses sacrifice security. That is why adopting DevSecOps and building security into software right from the start becomes an obvious solution. Sooner or later, this strategy is going to conquer the field of software development.

How Can Security Testing Fit Within Agile Development?

As software developers and associated business analysts are shifting more and more towards satisfying customer needs by providing them with a better quality product, they are consequently moving towards an agile mindset. Firms are changing the way they function to allow customer needs to be integrated not only into the final product and stages of sales but also all throughout the process of development of a product.

5 Things to Include in Your Cybersecurity Disaster Recovery Plan

As per the Varonis Global Data Risk Report for 2021, 13% of all the files and folders; and 15% of sensitive files in an organization are open to everyone. Further, when it comes to the SMEs, only 16% of them have done thorough cybersecurity posture reviews, and that too after encountering an attack. While organizations across the globe have very little or no preparedness when it comes to cybersecurity, cyberattacks are becoming more and more sophisticated.