New research indicates that even though mobile developers may follow security best practices in their projects, their apps may be contacting cloud-based backend platforms that can introduce vulnerabilities without their knowledge.
Major code vulnerabilities detected in the network stack of up to 200 million IoT devices could enable attackers to remotely execute code and take over or shut down devices in the field.
Secure-D has unveiled a free mobile malware center that lets developers and others see suspicious Android apps.
Oracle's summer Critical Patch Update is expected to contain 322 patches across the company's product line, including 10 security fixes for Java Standard Edition (Java SE).
Persistent mobile app development security issues -- in an age of unrelenting demand for more enterprise mobile apps -- can now be addressed with a cloud-based, upload-and-protect service.
New research from security vendor Positive Technologies examines vulnerabilities and threats in mobile applications, stating that the security level of iOS and Android apps is "roughly equivalent between the two platforms."
Research firm IDC has published a sponsored whitepaper examining the use of Android devices in the enterprise, where Google's flagship mobile OS fights security-related perceptions in its battle with Apple's iOS for business market share.
This week Shanghai, China-based VeChain announced ToolChain, a new blockchain-as-a-service (BaaS) offering for developers in a small- to medium-sized business environment.
All of the five Java SE vulnerabilities identified in the latest Critical Patch Update are remotely exploitable, and at least one is probably exploitable without the need for authentication.
The National Security Agency has open sourced its Ghidra software reverse engineering (SRE) framework.
According to a recent IoT security report from F-Secure, a lack of good password security (or no password at all) combined with unpatched vulnerabilities contribute to 87 percent of all IoT attacks.
This week IBM's X-Force Red security division announced it has launched a new testing service to help find weaknesses and fix vulnerabilities in Blockchain-based releases.
Several studies have linked the use of open source software and tutorials with the introduction of security vulnerabilities in production code, but a new one finds the same problem with online coding advice.
On Jan. 5 Coinbase detected a deep chain reorganization on the Ethereum Classic (ETC) blockchain, including a double spend.
Facing ever-more-sophisticated attack vectors, companies like Zimperium are infusing emerging AI technologies like machine learning into their mobile app defense solutions.
ActiveState published results of a survey conducted to examine challenges faced by developers who work with open source runtimes, revealing love for Python and security pain points.
Enterprise mobile and Web app development is riddled by security gaffes, according to a new report from WhiteHat Security, which is calling for a revamp of the development lifecycle.
A new study examined hundreds of popular Android apps for security vulnerabilities, finding that the improper use of open source software puts organizations and users at risk.
The company boosted the capabilities of its code obfuscation product and unveiled man-in-the-middle attack protection.