Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

4 Misconceptions about SAST for Mobile

SAST is one of the matured security testing methods. In the SAST, the source code is examined from the inside out while components are in a static position. It performs scanning in-house code and design to identify flaws that are reflective of weaknesses, and that could invite security vulnerabilities. The scans performed by SAST tools are dependent upon prior identification of rules that specify coding errors to examine and address.

5 Misconceptions about DAST for Mobile

Organizations that develop mobile apps need to be aware of the potential cyber security threats. These threats can lead to the loss of users' private data, which can have serious repercussions for industries like fintech, healthcare, ecommerce, etc. In order to prevent these malicious practices, Dynamic Application Security Testing (DAST), a security testing tool, has been introduced. It helps to weed out specific vulnerabilities in web applications whenever they run in the production phase.

Your Ultimate Social Media Security Checklist [2022 Updated]

Social media is both a boon and a bane. While it has connected billions of people, made them more accessible, and created more possibilities for the end-users. There's no doubt that it has also made them more susceptible to security threats and vulnerabilities. According to We Are Social, there are around 4.62 billion active social media users worldwide. This is precisely the very reason why cyber criminals love social media as well.

Microsoft Discovers Security Flaws In Pre-installed Android Apps

Four high-severity vulnerabilities have been exposed to the framework used by pre-installed Android system apps with millions of downloads. Fixed by Israeli developer MCE Systems, this issue could allow an attacker to launch remote and local attacks or be used as a vector to exploit extensive system privileges to obtain sensitive information. Here’s what Microsoft 365 Defender Research Team had to say about it.

China's New Mobile App Rules - Cybersecurity Updates 2022

The Chinese government took down over 2 million applications from Chinese app stores in just two years (2018-2020)! Now, the government has revised and published stricter cybersecurity updates or provisions for mobile app development, which will go into effect from August 1st, 2022. Why is this happening, and what does the new policy say? Also, how does it affect the developers within China? If you have these questions on your mind, this blog is for you.

Australia Recorded the Highest Rate of iOS & Android App Threats

Navigating the internet in 2022 is more dangerous than ever for Australian netizens. The risks to the privacy of Australian customers are at an all-time high, as the nation has reported the highest percentage of mobile threats globally, standing at 26.9%. The average Australian netizen uses web-based mobile apps to browse, entertain, communicate, and shop online.

Your Ultimate Guide to Black Box, Grey Box and White Box Testing

Are you looking about getting a penetration test done, but you're not sure what kind of test to get. If you are an IT consulting company, you must have heard about black-box, grey-box, and white-box testing. The following are some of the most common questions asked when it comes to selecting the type of testing: Consider the advantages and disadvantages of black box, grey box, and white box testing.

Top 10 Security Issues in Mobile App Development

As a mobile app developer, you must develop and release fully functional and safe applications. While you can manage the functionality quite comfortably, making the application secure and resilient to cyber-attacks is hard. So, what should you do? Well, we got you covered. This blog discusses the top 10 security issues developers encounter during mobile app development and the solutions.

Protect your Business with Enterprise Mobile Security in 2022

If you are not taking enterprise mobile security seriously, look at these stats: According to the State of Enterprise Mobile Security 2022 Report, 75% of the analyzed phishing sites targeted mobile devices. The same report stated that 30% of the total zero-day vulnerabilities discovered in 2021 targeted mobile devices. Security week states that mobile phishing attacks have increased at a consistent rate of 85% since 2011.

South Africa's POPIA vs. EU's GDPR: What You Need to Know

It's been a while; there has been a debate between GDPR and POPIA. Both compliances have made quite a mark since their inception. The South African Protection of Personal Act, also known as POPIA, means to provide South African citizens control over their data. It also makes all organizations processing the personal information in South Africa legally responsible to protect the data.