binary patchingcode tamperingCycriptdynamic memory modificationExtraneous FunctionalityFridaInsecure CommunicationInsecure Direct Object Referenceslocal resource modificationmethod hookingmethod swizzlingMobile bankingOWASP Mobile Security Testing GuideReverse Engineering iOS AppsSwift (More) Common Security Mistakes when Developing Swift Apps – Part II Nov 2, 2018 by Paulo Silva In my post last week I shared common security mistakes developers make when building Swift applications – covering insecure data storage, symmetric key algorithms, insecure communication and more. If you haven’t read it, please take a few minutes to review this information. It’s critical to understand these mistakes as well as the ones I’m sharing Read More › binary patchingcode tamperingCycriptdynamic memory modificationExtraneous FunctionalityFridaInsecure CommunicationInsecure Direct Object Referenceslocal resource modificationmethod hookingmethod swizzlingMobile bankingOWASP Mobile Security Testing GuideReverse Engineering iOS AppsSwift
Application SecurityCloud SecurityGoogleHackinginsuranceMalwareMobile bankingSSP What’s HOT in Application Security Vol #35 Nov 9, 2012 by asaphs Securities and Exchanges Commission leaves sensitive data vulnerable to hackers Staff of the Securities and Exchanges Commission (SEC) have left highly sensitive information from exchanges open to hacking and other cyber attacks because they miserably and negligently failed to secure their data and devices to the required standards. This statement came after inside information was leaked to the News Agency Read More › Application SecurityCloud SecurityGoogleHackinginsuranceMalwareMobile bankingSSP
Application SecurityCloud SecurityData Security BreachMobile bankingSQL Injectionstatic code analysisVulnerabilitywebsite security What’s Hot in Application Security Vol #11 May 9, 2012 by Checkmarx Is fear in the Cloud misplaced? Who’s afraid of the big bad cloud? Everyone apparently! Corporations, Public Companies; the list is endless. Cloud Security is synonymous with problems. When we consider Cloud Security we think about application security and guarding sensitive data. Cloud Security has been one of the things on the front of the Read More › Application SecurityCloud SecurityData Security BreachMobile bankingSQL Injectionstatic code analysisVulnerabilitywebsite security
AndroidApplication SecurityCloud SecurityData Security BreachMobile bankingRSASource Code AnalysisSQL Injectionstatic code analysisVulnerabilityXSS What’s HOT in Application Security Vol#6 Mar 26, 2012 by Checkmarx Application Security- Not Sufficient! A study was recently conducted among 800 It executives which found that there is a huge difference between the perception of Security from the viewpoint of the developer and security professionals. Security professionals view the applications in a far more optimistic light- stating that they are secure enough, whilst developers say Read More › AndroidApplication SecurityCloud SecurityData Security BreachMobile bankingRSASource Code AnalysisSQL Injectionstatic code analysisVulnerabilityXSS
Application SecurityCloud SecurityData Security BreachMobile bankingSource Code AnalysisSQL Injectionstatic code analysisXSS What’s HOT in Application Security Vol #3 Mar 7, 2012 by Checkmarx Let’s understand the web application security dilemma! Organizations within the financial services industry track an average of 800 attacks, organizations out with the financial services industry track an average of 500 attacks- no wonder it’s so vital to understand application security. It’s said that the security challenge is due to the fact that most of Read More › Application SecurityCloud SecurityData Security BreachMobile bankingSource Code AnalysisSQL Injectionstatic code analysisXSS
Data Security BreachMobile bankingSQL Injection What’s HOT in Application Security Vol #2 Feb 28, 2012 by Checkmarx Mobile banking threats Millions of consumers are currently using mobile banking – which is expected to be the next major target for hackers. As banks are focusing resources in securing mobile applications, two important precautions developers must take into account include: Read More › Data Security BreachMobile bankingSQL Injection