Developing a COVID-19 track and trace app — through the lens of Synopsys

Developing a COVID-19 track and trace app — through the lens of Synopsys

The rapidly evolving COVID-19 emergency has set off a global race to trace, and Synopsys offers key considerations for track and trace application development. The post Developing a COVID-19 track and trace ...
CyRC analysis: CVE-2020-7958 biometric data extraction in Android devices

CyRC analysis: CVE-2020-7958 biometric data extraction in Android devices

We dig into the inner workings of trustlets, how different components work together to provide a Trusted Execution Environment, and how to attack them. The post CyRC analysis: CVE-2020-7958 biometric data extraction ...
5G: Vast potential, but better security needed

5G: Vast potential, but better security needed

5G security is top of mind for those who recognize that 5G is going to be higher risk. Fuzzing is one of the leading testing techniques for securing 5G. The post 5G: ...
Checkmarx Research: SoundCloud API Security Advisory

Checkmarx Research: SoundCloud API Security Advisory

Recently, the Checkmarx Security Research team investigated the online music platform SoundCloud. According to their website, “As the world’s largest music and audio platform, SoundCloud lets people discover and enjoy the greatest ...
[Webinar] Mobile application hardening for business-critical apps

[Webinar] Mobile application hardening for business-critical apps

Mobile apps often protect themselves via internally developed controls and commercial products. Learn about how some controls work and how to sidestep them. The post [Webinar] Mobile application hardening for business-critical apps ...
Hijacking Google Pixel Camera Application

How Attackers Could Hijack Your Android Camera to Spy on You

This blog was co-authored by Pedro Umbelino, Senior Security Researcher, Checkmarx. Introduction In today’s digitally-connected society, smartphones have become an extension of us. Advanced camera and video capabilities in particular are playing ...
Kotlin Guide: Why We Need Mobile Application Secure Coding Practices

Kotlin Guide: Why We Need Mobile Application Secure Coding Practices

October is the annual National Cybersecurity Awareness Month (NCSAM), which is promoted by the U.S. Department of Homeland Security and the National Initiative for Cybersecurity Careers and Studies (NICCS). According to the ...
LeapFrog LeapPad Ultimate Security Vulnerabilities

LeapFrog LeapPad Ultimate Security Vulnerabilities

Protecting our children from the dangers on the internet is something all parents strive for and struggle with. When you find a toy that you think is safe, and will educate and ...
Cybersecurity Issues in Mobile App Development

Cybersecurity Issues in Mobile App Development

Mobile app development has become a key factor for the success of any business. And as mobile apps have grown more popular among users, it’s important for developers to make security of ...
Security Boulevard