hacking | TechWell

hacking

Tester holding black Android smartphone Detecting and Preventing Android Security Risks

Even though the Android app development process involves thorough verification, there has been no preventing new malware from being developed. Here are some of the most common potential security risks Android users should watch out for, as well as some measures to take to protect your smartphone, data, and privacy.

Harshal Shah's picture
Harshal Shah
The Potential for DevOps in Fighting Cyber Warfare

Government hacking incidents have put cyber warfare in the news. DevOps actually presents an interesting arsenal. With DevOps, your systems have excellent environment monitoring and are cryptographically verifiable such that the slightest penetration or unauthorized change is immediately detected.

Bob Aiello's picture
Bob Aiello
Can Bug Bounty Programs Replace In-House Testing?

Large companies have long used bug bounty programs to find vulnerabilities in their software, but these initiatives are becoming increasingly common among individual developers, too. Should a small business use a bug bounty program? And could it even replace their in-house testing? Should it?

Sanjay Zalavadia's picture
Sanjay Zalavadia
Apple Pay's Security Concerns Holding It Back

Apple Pay might be simple and easy to use, but the number of people in the US who distrust mobile payment systems due to the degree of personal information that needs to be shared increased by 9 percent year-over-year, bringing it to 35 percent. Security issues are holding the app back.

Josiah Renaudin's picture
Josiah Renaudin
US Military’s Social Media Accounts Hacked

The US military command’s Twitter and YouTube accounts were hacked recently. Though the episode essentially amounted to little more than an annoyance, it should lead to an investigation into whether there are any more vulnerabilities in the administration's online accounts and profiles.

Beth Romanik's picture
Beth Romanik
Keeping One Step Ahead of Cloud Hackers

Cloud systems are tempting targets for hackers because a single successful breach can steal information from multiple companies. To keep one step ahead of hackers, you need to understand what you can protect, where you might lose visibility, and where you need to apply extra security assurance.

Nazar Tymoshyk's picture
Nazar Tymoshyk
Who Should Be Testing? New Considerations after Security Breaches

Debates arise when people start talking about where a particular IT function should be performed. Executives can act as if testing is a necessary evil and cost is the only important factor. But due to recent security breaches, companies should be more concerned with comprehensive testing than cost.

Jennifer Bonine's picture
Jennifer Bonine
Doing Our Part to Contain Point-of-Sale Data Theft

It’s easy for us as software developers and testers to dismiss intrusions on point-of-sale systems as the fault of network security professionals or inadequate network defenses. The reality is that there is a lot we should be doing as well on the software side to prevent these kinds of attacks.

Jennifer Bonine's picture
Jennifer Bonine