Verimatrix and Inside Secure have merged. Learn more here. Go to Verimatrix website.

What does your app say about you?

What does your app say about you?

Mobile apps attempt to hide a lot of secrets. There is a tendency to focus on assets like personal data, credit card information, cryptographic keys and IP. This is understandable as these are technical assets and app security quickly becomes a technical discussion.

May 29, 2019
Security for Connected Devices

Security for Connected Devices

IoT typically represents a network of physical objects (or “things”) embedded with electronics, software, sensors, and connectivity to enable those objects to exchange data with the manufacturer, operator, cloud and/or other connected devices.

Apr 3, 2019
Your printer can be a dangerous, overlooked attack surface

Your printer can be a dangerous, overlooked attack surface

The end of 2018 saw a rash of cyberattacks mounted by way of networked printers. In one notable incident, as reported by Kaspersky, a hacker targeted 50,000 printers and caused them to print a message supporting a YouTuber named PewDiePie. According to Kaspersky, the hacker had utilized Shodan, a search engine for devices, and found no fewer than 800,000 vulnerable printers from which to choose. This story, and many others like it, should alarm anyone tasked with cyber security duties. The ubiquitous printer can be a dangerous, overlooked attack surface.

Mar 20, 2019
Circles and End Points, Mobile World Congress 2019

Circles and End Points, Mobile World Congress 2019

Anyone that follows the world through tradeshows for long enough knows they are cyclic. Whether that’s the rise and fall of events or the themes within events, patterns start to emerge.

Mobile World Congress is no different.

Smartphones may get faster, the stands may get bigger *; but recurrent themes start to emerge.

Mar 4, 2019
Are you playing Russian Roulette with your apps?

Are you playing Russian Roulette with your apps?

The growth in usage means that there is an increase in sensitive data being installed, stored and generated on mobile devices. That data is the users’ personal data – governed by privacy legalisation like GDPR; it is the Intellectual Property in the apps; and it is secrets like cryptographic keys that are used to secure both the data on the device and access to backend services.

Feb 22, 2019
Will an App Hack Cyber Attack Steal Your Car - Your Life?

Will an App Hack Cyber Attack Steal Your Car - Your Life?

Today’s cars have more in common with powerful computers than with their mechanical machine ancestors.

And as more and more cars become internet-connected, cybersecurity has become a pressing issue for the automotive industry.

Nov 28, 2018