How to Defend against App Impersonation in 2022

How to Defend against App Impersonation in 2022

Editor's note: This post was originally published in November 2021 in ThreatPost Most users who install applications through legitimate channels such as Google's Play Store or the Apple Store do so with ...
How to Defend against App Impersonation in 2022

How to Defend against App Impersonation in 2022

Editor's note: This post was originally published in November 2021 in ThreatPost Most users who install applications through legitimate channels such as Google's Play Store or the Apple Store do so with ...
FHIR API Security Research - 3 Immediate Actions For Mobile Healthcare Companies

FHIR API Security Research – 3 Immediate Actions For Mobile Healthcare Companies

Considering the recent “Playing with FHIR” research report together with the earlier “All that We Let In” research report (which looked at the state of mHealth app/API security), it would be understandable ...
FHIR API Security Research - 3 Immediate Actions For Mobile Healthcare Companies

FHIR API Security Research – 3 Immediate Actions For Mobile Healthcare Companies

Considering the recent “Playing with FHIR” research report together with the earlier “All that We Let In” research report (which looked at the state of mHealth app/API security), it would be understandable ...
FHIR API Security Research Sparks Debate

FHIR API Security Research Sparks Debate

Alissa Knight released her report “Playing with FHIR” a couple of weeks ago (download it here) about her investigations into the security of healthcare apps and APIs which use the FHIR standard ...
CounterespionageBlog-1

Traveling abroad on business? Assume that your smartphone will be compromised.

When visiting certain high-risk countries on business, your smartphone activity may be monitored by local intelligence services. From fake cell towers to malicious carrier updates, spies in these countries have a number ...
EvolutionBlog

The future of hardware isolation for mobile devices

SafeCase, our smartphone-coupled security device, serves as an ExoComputer: a secondary, special-purpose computing device to the smartphone. At first blush, the concept of an independent, security-focused system parallel to the mobile device ...
How European telecoms defend their customers from the latest cybersecurity threats

How European telecoms defend their customers from the latest cybersecurity threats

Have you seen the latest cyberthreat report? The numbers are mind-boggling! Our data show that Allot’s network security services blocked cyberthreats from harming European subscribers 653,996,978 times in the first half of ...
Ensuring Secure Remote Care For The Elderly

Ensuring Secure Remote Care For The Elderly

In this article, we’ll be looking at the role that mobile health or mHealth apps and Application Programming Interfaces (APIs) are playing in remote care of the elderly. We shall also consider ...
digital ID driver's license personal data

Digital Driver’s Licenses: Unintended Consequences

Maryland recently joined seven other U.S. states to permit users to carry “digital driver’s licenses.” Under the program—which initially will work with Apple devices like iPhones—users can download a digital credential—a digital ...
Security Boulevard