Entersoft Security Blog

Implementing Security in IoT

Posted by Entersoft Team on Nov 29, 2017 9:44:36 PM

 

The Internet of Things continues to connect an ever-increasing number of devices. We're heading towards a seamlessly connected world that will have 24 billion IoT devices by 2020. Connected devices are making headway into each and every aspect of our lives, including homes, offices, cars and even cities.

Read More

Topics: Application Security, Application Security Guidelines, cyber security, IOT Security

Race Condition Vulnerabilities in Web Applications

Posted by Entersoft Team on Sep 15, 2017 8:14:29 PM

Race conditions in software arise when two concurrent threads of execution access a shared resource in a way that unintentionally produces different results; depending on the time at which the code is executed. For example, a multi-threaded program may spawn 2 threads that have access to the same location in memory.

Read More

Topics: Application Security, Application Security Guidelines, cyber security

Entersoft Essentials: Android Security Guidelines to Secure Your App

Posted by Angad Gill on Sep 21, 2016 11:16:50 PM

nexus-5-1407846_1280.jpg

Lack of security standards at any market place makes it difficult to manage security controls at an application level. Having a strong security checklist in place not only improves app security but the ecosystem involved in the development process, as well. Also, robust security standards and well set guidelines differentiate a platform from the others.

Read More

Topics: Android App Security, Android Best Practices, Android Security, Application Security, Application Security Guidelines, Playstore Security guidelines, Security Checklist, Security DOs, Security Guidelines