[WATCH] Live Hack Demo at Bengaluru Tech Summit ft. Ankit Fadia

Posted by Charan on 25 janv. 2019 20:13:10
Entersoft Team demonstrated a live cyber attack on an Android phone in Bengaluru Tech Summit as a part of Entersoft's flagship Hackfest event. The hack was followed by a Q&A session with Ankit Fadia.
Read More

Topics: Android App Security, Android Security, Application Security, Application Security Guidelines, cybersecurity, Events

Implementing Security in IoT

Posted by Entersoft Team on 29 nov. 2017 21:44:36

 

The Internet of Things continues to connect an ever-increasing number of devices. We're heading towards a seamlessly connected world that will have 24 billion IoT devices by 2020. Connected devices are making headway into each and every aspect of our lives, including homes, offices, cars and even cities.

Read More

Topics: Application Security, Application Security Guidelines, cyber security, IOT Security

Race Condition Vulnerabilities in Web Applications

Posted by Entersoft Team on 15 sept. 2017 20:14:29

Race conditions in software arise when two concurrent threads of execution access a shared resource in a way that unintentionally produces different results; depending on the time at which the code is executed. For example, a multi-threaded program may spawn 2 threads that have access to the same location in memory.

Read More

Topics: Application Security, Application Security Guidelines, cyber security

Entersoft Essentials: Android Security Guidelines to Secure Your App

Posted by Angad Gill on 21 sept. 2016 23:16:50

nexus-5-1407846_1280.jpg

Lack of security standards at any market place makes it difficult to manage security controls at an application level. Having a strong security checklist in place not only improves app security but the ecosystem involved in the development process, as well. Also, robust security standards and well set guidelines differentiate a platform from the others.

Read More

Topics: Android App Security, Android Best Practices, Android Security, Application Security, Application Security Guidelines, Playstore Security guidelines, Security Checklist, Security DOs, Security Guidelines