Sign in with Apple

What Is Sign in with Apple’s Impact on Development?

 With more than 5 billion mobile phones on the market around the globe, mobile security is more important than ever. And the recent announcement from Apple around its Sign in with Apple guidelines ...
Security Boulevard
app security

Mobile App Security: Securing From the Start

Researchers at the app security technology provider Promon recently revealed a dangerous flaw christened “StrandHogg” they allege is present in every version of Android up to and including Android 10, released in ...
Security Boulevard
Fleeceware – 25 Play Store apps that empty your pockets

Fleeceware – 25 Play Store apps that empty your pockets

Last September, security researchers reported a number of app publishers that practice a shady business model, charging excessive amounts for apps if the user does not cancel the “subscription” before a free ...
location data

Don’t (Geo)Fence Me In: Courts Order Google To Give Up Location Data

The danger in forcing companies with location-tracking apps to hand over the data to help solve crimes When you install a “Black Friday” app on your cellphone, you aren’t really expecting it ...
Security Boulevard

Android “Ghost Click” Apps, New Apple Siri Privacy Protections, Credit Card Spying

You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 84 for September 2nd 2019: “Ghost click” Android apps ...
Improved, Stable Tor Browser Released for Android

Improved, Stable Tor Browser Released for Android

Great news for users who want to hide their location when surfing the web and prevent websites from tracking their activity: Tor, the online security and privacy-focused browser, is now available on ...
Organizations Still Don’t Get Mobile Security

Study: Organizations Still Don’t Get Mobile Security

When it comes to the security of their mobile applications, it seems organizations are still not getting it. Even when they are able to check off security compliance checklists and remain compliant ...
Security Boulevard
Compromising Web Security, Impacting Business Continuity

Scraping Attacks: Compromising Web Security, Impacting Business Continuity

We often see businesses devising ingenious ways to pull ahead of competitors in the hyper-competitive online business industry. From tiny startups to business giants such as Amazon and Walmart, companies today have ...
Security Boulevard
RasPi

How Secure Are Smart Security Systems?

Smart security systems promise to simplify keeping homes and properties secure with artificial intelligence, remote views of active cameras, voice commands and more. But cybersecurity researchers also are find another feature of ...
Security Boulevard
Necessary Information and Invasion of Privacy

The Fuzzy Line Between Necessary Information and Invasion of Privacy

Government surveillance is a longstanding topic of conspiracy theorists, but there’s something arguably much more widespread that’s concerning: the way companies collect information about customers and often don’t allow them to opt ...
Security Boulevard