Cloud developers still aren't securing their data stores, a new report claims, resulting in the exposure of private enterprise information stored in Firebase, Google's mobile back-end platform.
On Wednesday identity cloud security provider Okta Inc. announced the launch of API Products for One App, an API-based tool for authenticating single Web sites and applications.
Cloud hosting platform provider Jelastic has released a new version of Jelastic Shield, with which the company adds a number of security enhancements to its evolving PaaS/IaaS platform.
Mobile app integration specialist Appdome has entered a partnership to provide smoother implementation of the F5 Networks Anti-Bot SDK to protect mobile apps.
Providing security for IoT devices is getting expensive and will become costlier, according to a Gartner report released in March. IoT security spending will reach $1.5 billion in 2018, up from $1.2 billion in 2017, a 28 percent increase.
Amazon Web Services added encryption-at-rest to Amazon DynamoDB, increasing security options for its NoSQL cloud database service in the wake of publicized wide-open data stores found on the cloud platform.
Waratek announced a new security tool for Java and .NET applications that uses virtualization to quickly apply patches for long-term and newly discovered vulnerabilities.
Oracle's first Quarterly Critical Patch Update of 2018 provided fixes for 237 vulnerabilities across its product lines, including patches for 21 security holes in the Java Platform Standard edition (Java SE), 18 of which are remotely exploitable without authentication.
Dr. Ben Zorn, co-manager of Microsoft's Research in Software Engineering group, wonders if the smart fork you are using to eat your spaghetti could be hacked.
The latest report from security firm Check Point Software Technologies Ltd. identifies the top three mobile malware threats -- which all run on Android.
Google' Safe Browsing team has expanded the enforcement of the company's Unwanted Software Policy, promising to flag Android apps in Google Play that collect personal information about users without their consent.
A new report from application security vendor Veracode paints an unflattering picture of Java developers, finding 88 percent of Java applications contain at least one vulnerable component.
Amid increasing reports of cyberattacks and data breaches, open source security company Flexera has published the results of a study examining the risk of using vulnerable open source code in enterprise applications and systems.
More than 90 percent of the vulnerabilities can be exploited remotely without authentication; about 60 percent can allow attackers to perform remote denial-of-service attacks; and more than 72 percent of these vulnerabilities can be easily exploited, because their attack complexity is low.
To improve the security of Android apps offered in the Google Play store, the search giant has launched a bug bounty program to award $1,000 to hackers who discover bugs in select, popular apps and work with developers to fix them.
Attack campaigns are currently being waged against the latest Adobe Flash security hole, the company announced on Monday.
WPA2, the gold-standard protocol for protecting Wi-Fi networks, has been found to have a serious security vulnerability.
GitHub is boosting the security capabilities of its software development platform, introducing new open source project dependency graphs and promising alerts when bad actors show up in those graphs.
Without baking in proper training and education, a new study suggests that the rush to adopt DevOps practices might be leading enterprises to an insecure place.
Data from 12th annual WhiteHat Security study shows Android apps are plagued by incorrectly set backup flags, while many iOS apps allow unsecure cookies.