The Latest in IT Security

Posts Tagged ‘user data’

Published to Google Play by the same developer, the two applications, ‘File Recovery and Data Recovery’ and ‘File Manager’, were seen launching without user interaction and silently exfiltrating a trove of sensitive user information. According to Pradeo, the two spyware apps would send out users’ contact list, media content, real-time location, network provider, country code, […]

Read more ...

Cybersecurity experts have uncovered more than a thousand mobile applications carrying a flawed API that are leaking sensitive endpoint(opens in new tab) and user information. Researchers from CloudSEK found 1,550 mobile apps using Alogolia, a proprietary API that helps mobile developers integrate search engines with discovery and recommendation features found in websites and apps. According […]

Read more ...

Customer identity and access management (CIAM) is a type of identity technology that allows organizations to manage customer identities, providing security and an enhanced experience. The primary purpose of CIAM is to help organizations deliver a great experience to customers and to protect their user data. Digital transformation is changing everything about the way companies […]

Read more ...



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments