Onegini IT

21
Apr

A new batch of security flaws in Android have been fixed by Google. These vulnerabilities could let hackers take over gadgets through malicious apps or remotely.

Read More
07
Apr

Smart TVs start getting into more and more houses nowadays. The tricky thing here is that they are hewing a new door for cybercriminals’ attacks, as the gadgets’ security defenses frequently are far from the levels of those in desktop computers and smartphones.

Read More
07
Apr

According to Verizon’s latest health care data breach report, stolen and lost gadgets are responsible for 45% of all breaches. This means almost a half of about 2,000 cases with total losses surpassing 392 mil records.

Read More
31
Mar

Hzone is a dating application for singles that are positive for HIV. According to the company’s representatives, they have over 4,900 registered users. At some point before November 29, the MongoDB that houses the application’s data was unshielded against the Internet. Nevertheless, the company didn’t enjoy the idea of disclosing this security incident and decided that the best way to respond to such suggestion is threatening with infection. Sounds, like some kind of a Hollywood action movie villain’s plan, but here we are!

Read More
24
Mar

A few enterprises started hassling on adding encryption to their mobile applications after finding out that they failed to encrypt payment card data in transit, thus putting their users at serious risk. These mobile apps weren’t running SSL/TLS (Secure Sockets Layer/Transport Layer Security). In short, this is an encryption protocol that cyphers data during its transit through the web.

Read More
24
Mar

Payment landscape is being rather promptly changed by mobile wallets. According to one of the CMO.com studies, 56% of consumers want to use their mobile gadget to proceed payments for things they’re shopping for.

Today, any technological advancement unavoidably gives way to risks and vulnerabilities in any area, including mobile wallets. Attackers are always looking for loopholes in applications and attempt to snatch funds or cheat with the consumer data that might considerably damage businesses in both reputational and monetary aspects.

Read More
17
Mar

First of all, it has to be noted that this post isn’t an extensive list, so there still could exist other threat vectors. What we intend to do with it is to give real hard time to hackers as they try to break into your mobile app.

When you develop your application and elaborate your mobile strategy, it’s critical to test your apps through a number of features, including security, functionality, load, compatibility, usability, performance, etc. As time to market is crucial, most organization frequently compromise on the part of security testing.

Read More
10
Mar

Cisco has managed to fix a problem in its own WebEx Meetings app for Android devices that permitted potentially malicious software to hijack permissions in it.

Read More
03
Mar

7-Basic-Security-Tips-to-Follow-when-Using-Digital-Wallets.pngTechnologies of mobile payment have evolved enormously over the years. They have become one of the engines of commerce nowadays. By 2017, the global mobile payments market is to grow up to $721.4 billion, according to experts, and consumers along with retailers are taking over digital payments more eagerly, than ever before. No more checks or cash for payments or standing in lines at ATM counters or banks.

Read More
23
Nov

Move away from old technology with high costs for offering security. Hardware tokens are costly and require users to have it with them all the time. This is not at al convenient as people tend to forget these items. Use the thing people have with them all the time, the thing that is part of their limbic system. Yes I am talking about a smartphone. In this webinar Denis will explain how you can use a smartphone for strong authentication and get rid of those pesky little hardware tokens.

Read More