• support@amicusindia.in
  • Call Us: 044 49572214
  • Amicus India Private Limited, No 75, Astalakshmi Nagar, 3rd Street Valasaravakkam Chennai - 600087

Tag Archives: amicusindia

28 Jun 2018
rtxxzvx

Keep your Information Safe from Hackers in 5 ways

rtxxzvx

The internet is a wonderful place, full of knowledge and entertainment, and most of us are doing more and more digitally with each passing year. For all that the internet is wonderful, there is a dark side: Hackers, both lone individuals and criminal syndicates, are preying on the vulnerable and unwary.

You’ve probably read about some of the high profile hacks targeting large companies and compromising the information and identities of hundreds of millions of people. Those kinds of hacks and intrusions happen on a much smaller scale as well, with hackers targeting individual people with the purpose of identity theft and fraud.

Fortunately, there are a number of things you can do to make yourself less vulnerable to hackers. Here are five ways you can protect yourself.

1. Update Software Regularly

The makers of operating systems and other software you use are constantly discovering vulnerabilities in their structure which makes a person running that software vulnerable to attack. Often, these discoveries come as a result of a successful hack that the makers learn about.

When they discover a vulnerability, they update the software to close the loophole hackers can potentially use to exploit your computer. However, if you don’t update your software, you’re still going to be running the version containing those vulnerabilities. It’s especially crucial to update your OS and web browser, as those tend to be focal points for hackers trying to compromise your computer.

2. Avoid Open Wifi

When setting up your internet connection, make absolutely sure to set a password for your wifi connection rather than letting it be open. If you leave it open, anyone is able to leach off your connection and do whatever they want, which can include downloading illegal files.

Another tip for keeping your internet connection safe is to replace your router every couple of years. Routers sometimes end up with vulnerabilities that don’t get patched over time, so using an outdated router can leave you open to attack.

3. Use Security Software

Make sure to install security programs on your computer. You should have both anti-virus and anti-malware software, as well as anti-spyware program and a firewall. Often times, operating systems come with a firewall prepackaged, but if yours didn’t have one, find one.

If you want to go the extra mile to keep your computer safe, there are programs and software such as a Managed Detection and Response Service that can help detect and respond to cyber attacks. There are a wide range of security programs on the market, so doing some research and picking the right options for yourself is important.

4. Maintain Password Integrity

One of the main ways hackers gain access to data is the simplest way possible: Logging in as a user with that user’s password. Sometimes, hackers exploit people with weak passwords. More often, they steal a password from a database somewhere. There are a couple of things you can do to lessen your vulnerability.

First of all, create a strong password. Longer passwords are better than shorter, and it’s advisable to use a combination of uppercase and lowercase letters, numbers and other characters. Avoid common phrases like ‘123456’, ‘password’ or ‘qwerty’, as these are all too often used as passwords .

If a hacker can get a password of yours for one account, then use that password to access others , as people tend to reuse passwords for multiple accounts. Resist the urge to do this, as doing so will mean that one password being stolen means all your accounts are compromised.

5. Guard Personal Info on Obsolete Devices

Just because you’ve thrown away a computer, phone or tablet away doesn’t mean that it’s gone entirely. If a hacker gets his or her hands on an old device of yours and your personal info is still intact on it, you are at risk. Old devices can store your passwords, personal identity information and more.

If you’re going to sell or throw away any hardware that contains your personal info, makes sure to destroy any and all traces of your personal identity or information before getting rid of it. Using d-ban to erase your hard drive makes it extremely difficult for any hacker to find you information. However, the safest route is to physically destroy the hard drive of any device you won’t be using anymore.

27 Jun 2018
brightspotcdn-com

Seven Frequently Asked Questions About Mobile App Vulnerabilities

brightspotcdn-com

Mobile app developers have to release apps as quickly as possible. The time to market is so short that they often do not have time to check for security flaws.

Even when there is time, developers may not have the necessary resources to fix bugs.

That may be why, according to the 2016 NowSecure Mobile Security Report, business devices are times more likely to leak login credentials than other mobile devices. This brief article answers some of the frequently asked questions to start improving your app security.

1. What type of mobile app vulnerability is the highest risk?

The worst vulnerability is the one you don’t know about.

Next to that, however, lack of encryption in network communication is a serious issue. Clear text communication to network hosts exposes all data, including login credentials. Once that is exposed, everything else is exposed.

2. An app security consultant tested my new application and found no problems. What are the odds that a new app is flawless?

It’s probable the tester didn’t test hard enough or deeply enough. Maybe there’s nothing wrong with the source code, but login data is unencrypted, for example. It’s usually fairly easy to find a flaw that enables a bad actor.

Bottom line: keep testing for vulnerabilities. Automated tools are nice, but they can’t (yet) replace human searches for security weaknesses.

3. How do I choose the best security tools?

The first step is to ask colleagues and partners. See what people are talking about. Once you have a list, get trial licenses from multiple vendors. These are usually available for free or cheap. While you need to keep within your budget, you also need a tool that does more than simply tests the app’s function.

The best solutions will test source code, network communication, web access, forensics, and other areas. Consult with a person or company who has experience in dozens of security analysis tools to verify your app’s security.

4. What do you do if your third party mobile app developer doesn’t do its own testing and won’t share the source code with you?

Find a different third party app developer. If a vendor won’t do its own testing and won’t let you do the testing, that’s a red flag. It may not want to acknowledge security flaws so it doesn’t have to deal with them. Remember that a third party developer still has your name on it — not the developer’s — and you will be held accountable for problems.

5. Should my app developers go for security training?

Absolutely. Training is one of the core challenges of app security. Developers aren’t security experts and do not necessarily have the tools they need to make prevent app vulnerabilities from sneaking in. Learning about threat modeling, defining specific security requirements, and identifying how bad actors exploit vulnerabilities can help set them up for success.

OWASP (owasp.org) is probably the best developer training resource available today. YouTube also has a number of useful tutorials.

6. Should I do traditional app vulnerability testing or focus on source code analysis?

It’s important not to rely on a single angle. Different security analysis tools find different things. Source code analysis is a good start, but vulnerabilities often “live” elsewhere in the app. It’s best to look at the application from every possible perspective.

If budget is a consideration, consider staggering vulnerability testing. For example, you may analyze source code one quarter and review the app itself in the next.

7. What are some hard numbers I should measure to test the security of my application?

In general, you should measure vulnerabilities as you uncover them. They may be classified into one of several categories. These will tell you what aspects of your application are at the most risk from bad actors and other weaknesses. One list of these categories includes:

  • Initial vulnerabilities
  • Repeat vulnerabilities
  • Remediation latency
  • Exploitable vulnerabilities
  • Vulnerabilities that go against best practices
  • Vulnerabilities that are being sought after (based on your log files)
26 Jun 2018
download

Five New Top Mobile App Development Tools

For the creative developer, apps provide some of the most exciting opportunities in today’s rapidly evolving IT playing field. With open source development fueling the engine for even greater innovation and versatility, today’s apps are the precursor to a future world of limitless possibilities, enabled by cutting-edge development tools.

Fortunately for developers, consumer demand seems to be virtually insatiable. By March 2017, the world’s two leading app stores had more than five million available apps; specifically, Google Play with 2.8 million, and Apple with 2.2 million. Likewise, by 2020, mobile apps are predicted to generate $188.9 billion in revenues through in-app ads and app store purchases.

Added to this, recent statistics tell us that 95 percent of Americans own some type of cell phone, and 77 percent of these are app-capable Smartphones. Likewise, Americans are spending an average of three hours and 23 minutes of their Internet browsing time per day on apps.

With numbers like these, it’s no wonder that the market continues to be flooded with the rapid emergence of cutting-edge app development tools. Here are five of the latest and greatest, some free and open source with no coding needed, others requiring code and offering more custom functionality than ever before.

1. Appcelerator

Appcelerator is a one-stop shop for app builders, thanks to its amazing versatility. It offers more than 5,000 APIs for Windows, iOS, Android, HTML5 and BlackBerry. Working from a single JavaScript code base, Appcelerator creates apps that can run native on OS and any type of device. Extremely user-friendly for developers, Appcelerator provides pre-integrated cloud services so that you can test and compare during the creative process. In addition, it provides handy app usage analytics so that you can monitor adoption and usage, tweak performance, and detect crashes immediately. This versatility, coupled with real-time analytics features, makes Appcelerator a powerhouse tool for app builders and developers.

2. BuildFire

One of the greatest strengths of BuildFire is its versatility. It not only supports iOS and Android phones and tablets, it also has more than 45 plugins and pre-existing templates that you can build upon, as well as integrations to other customization/data services like Segment. It’s equally effective in building apps for media/entertainment content, corporate/business use, education, commerce and event promotion. It also claims to provide unlimited customization features so that the only limits are in the developer’s imagination.

One of its biggest selling points is ease and speed of usage. Enthusiasts say that you can build and launch your app in less than 30 minutes using only three steps. If you’re not a tech guru, no worries: BuildFire offers comprehensive tech support to walk you through the development process.

3. Mobile Roadie

Mobile Roadie, like the best of today’s app development tools, offers a multitude of solutions and features coupled with a sophisticated versatility. Equally user-friendly with iOS and Android, Mobile Roadie provides advanced media platforms for photo/audio/video usage, as well as platforms for live feed news posts, up-to-date event info and a realtime fan wall. You can also add extra features such as menus, a QR scanner, speakers, a store, a mailing list, links, shortcuts, image banners and a host of other extras. In addition, Mobile Roadie also offers app organization and user analytics features, plus marketing strategy and content entry services to help you launch your app into a waiting world.

4. Xamarin

Xamarin is Microsoft’s entry into the app development field, and it has proven to be another versatile and user-friendly player by allowing builders to use existing code and skills. Xamarin utilizes a C# codebase tool to produce native apps for Windows, Android and iOS, and it allows multi-platform code sharing for greater ease of usage, plus versatility. This means that you can use the same language, IDE and APIs across the board. In addition, you can distribute your newly created app to beta testers/users on iOS, Windows and Mac OS on demand.

Xamarin also provides cloud service, so that you can automate UI tests on thousands of devices, using hundreds of configurations. In addition, it offers an interactive dashboard that provides real-time usage and performance analytics.

5. The AppBuilder

It’s always interesting to discover new app tools created for specific industries, and The AppBuilder was designed to fill a specialized industry need. This innovative tool, which facilitates the creation of HR, employee and staff apps, has already been implemented by corporate entities as varied as London’s Heathrow Airport, VISA and Michelin.

TheAppBuilder creates apps that can provide real-time schedules and updates for employees, facilitate communications between departments, and organize HR data so that it’s immediately accessible. TheAppBuilder provides one-on-one online training and support, data hosting, security and live Google Analytics performance data, and posts everything under your own brand, graphics and imagery.

As the entire app ecosystem continues to grow and expand, developers are looking for tools that can make their apps more versatile and adaptable. Likewise, by mitigating the need for developers to learn extensive code, the best of today’s app development tools are paving the way for builders to create apps even more quickly — in some instances, within minutes — and effectively.