• support@amicusindia.in
  • Call Us: 044 49572214
  • Amicus India Private Limited, No 75, Astalakshmi Nagar, 3rd Street Valasaravakkam Chennai - 600087

Tag Archives: amicus data center

28 Jun 2018
rtxxzvx

Keep your Information Safe from Hackers in 5 ways

rtxxzvx

The internet is a wonderful place, full of knowledge and entertainment, and most of us are doing more and more digitally with each passing year. For all that the internet is wonderful, there is a dark side: Hackers, both lone individuals and criminal syndicates, are preying on the vulnerable and unwary.

You’ve probably read about some of the high profile hacks targeting large companies and compromising the information and identities of hundreds of millions of people. Those kinds of hacks and intrusions happen on a much smaller scale as well, with hackers targeting individual people with the purpose of identity theft and fraud.

Fortunately, there are a number of things you can do to make yourself less vulnerable to hackers. Here are five ways you can protect yourself.

1. Update Software Regularly

The makers of operating systems and other software you use are constantly discovering vulnerabilities in their structure which makes a person running that software vulnerable to attack. Often, these discoveries come as a result of a successful hack that the makers learn about.

When they discover a vulnerability, they update the software to close the loophole hackers can potentially use to exploit your computer. However, if you don’t update your software, you’re still going to be running the version containing those vulnerabilities. It’s especially crucial to update your OS and web browser, as those tend to be focal points for hackers trying to compromise your computer.

2. Avoid Open Wifi

When setting up your internet connection, make absolutely sure to set a password for your wifi connection rather than letting it be open. If you leave it open, anyone is able to leach off your connection and do whatever they want, which can include downloading illegal files.

Another tip for keeping your internet connection safe is to replace your router every couple of years. Routers sometimes end up with vulnerabilities that don’t get patched over time, so using an outdated router can leave you open to attack.

3. Use Security Software

Make sure to install security programs on your computer. You should have both anti-virus and anti-malware software, as well as anti-spyware program and a firewall. Often times, operating systems come with a firewall prepackaged, but if yours didn’t have one, find one.

If you want to go the extra mile to keep your computer safe, there are programs and software such as a Managed Detection and Response Service that can help detect and respond to cyber attacks. There are a wide range of security programs on the market, so doing some research and picking the right options for yourself is important.

4. Maintain Password Integrity

One of the main ways hackers gain access to data is the simplest way possible: Logging in as a user with that user’s password. Sometimes, hackers exploit people with weak passwords. More often, they steal a password from a database somewhere. There are a couple of things you can do to lessen your vulnerability.

First of all, create a strong password. Longer passwords are better than shorter, and it’s advisable to use a combination of uppercase and lowercase letters, numbers and other characters. Avoid common phrases like ‘123456’, ‘password’ or ‘qwerty’, as these are all too often used as passwords .

If a hacker can get a password of yours for one account, then use that password to access others , as people tend to reuse passwords for multiple accounts. Resist the urge to do this, as doing so will mean that one password being stolen means all your accounts are compromised.

5. Guard Personal Info on Obsolete Devices

Just because you’ve thrown away a computer, phone or tablet away doesn’t mean that it’s gone entirely. If a hacker gets his or her hands on an old device of yours and your personal info is still intact on it, you are at risk. Old devices can store your passwords, personal identity information and more.

If you’re going to sell or throw away any hardware that contains your personal info, makes sure to destroy any and all traces of your personal identity or information before getting rid of it. Using d-ban to erase your hard drive makes it extremely difficult for any hacker to find you information. However, the safest route is to physically destroy the hard drive of any device you won’t be using anymore.

27 Jun 2018
brightspotcdn-com

Seven Frequently Asked Questions About Mobile App Vulnerabilities

brightspotcdn-com

Mobile app developers have to release apps as quickly as possible. The time to market is so short that they often do not have time to check for security flaws.

Even when there is time, developers may not have the necessary resources to fix bugs.

That may be why, according to the 2016 NowSecure Mobile Security Report, business devices are times more likely to leak login credentials than other mobile devices. This brief article answers some of the frequently asked questions to start improving your app security.

1. What type of mobile app vulnerability is the highest risk?

The worst vulnerability is the one you don’t know about.

Next to that, however, lack of encryption in network communication is a serious issue. Clear text communication to network hosts exposes all data, including login credentials. Once that is exposed, everything else is exposed.

2. An app security consultant tested my new application and found no problems. What are the odds that a new app is flawless?

It’s probable the tester didn’t test hard enough or deeply enough. Maybe there’s nothing wrong with the source code, but login data is unencrypted, for example. It’s usually fairly easy to find a flaw that enables a bad actor.

Bottom line: keep testing for vulnerabilities. Automated tools are nice, but they can’t (yet) replace human searches for security weaknesses.

3. How do I choose the best security tools?

The first step is to ask colleagues and partners. See what people are talking about. Once you have a list, get trial licenses from multiple vendors. These are usually available for free or cheap. While you need to keep within your budget, you also need a tool that does more than simply tests the app’s function.

The best solutions will test source code, network communication, web access, forensics, and other areas. Consult with a person or company who has experience in dozens of security analysis tools to verify your app’s security.

4. What do you do if your third party mobile app developer doesn’t do its own testing and won’t share the source code with you?

Find a different third party app developer. If a vendor won’t do its own testing and won’t let you do the testing, that’s a red flag. It may not want to acknowledge security flaws so it doesn’t have to deal with them. Remember that a third party developer still has your name on it — not the developer’s — and you will be held accountable for problems.

5. Should my app developers go for security training?

Absolutely. Training is one of the core challenges of app security. Developers aren’t security experts and do not necessarily have the tools they need to make prevent app vulnerabilities from sneaking in. Learning about threat modeling, defining specific security requirements, and identifying how bad actors exploit vulnerabilities can help set them up for success.

OWASP (owasp.org) is probably the best developer training resource available today. YouTube also has a number of useful tutorials.

6. Should I do traditional app vulnerability testing or focus on source code analysis?

It’s important not to rely on a single angle. Different security analysis tools find different things. Source code analysis is a good start, but vulnerabilities often “live” elsewhere in the app. It’s best to look at the application from every possible perspective.

If budget is a consideration, consider staggering vulnerability testing. For example, you may analyze source code one quarter and review the app itself in the next.

7. What are some hard numbers I should measure to test the security of my application?

In general, you should measure vulnerabilities as you uncover them. They may be classified into one of several categories. These will tell you what aspects of your application are at the most risk from bad actors and other weaknesses. One list of these categories includes:

  • Initial vulnerabilities
  • Repeat vulnerabilities
  • Remediation latency
  • Exploitable vulnerabilities
  • Vulnerabilities that go against best practices
  • Vulnerabilities that are being sought after (based on your log files)