Software Integrity Blog

Archive for the 'Mobile Application Security' Category

 

The timeless truth of software security fundamentals

More than a decade’s worth of good deeds were recently memorialized with Microsoft’s announcement that Michael Howard and Steve Lipner’s book The Security Development Lifecycle (PDF) is now available for free online. What a great contribution by Michael, Steve, and Microsoft to the community; and cheers to the continued growth of software and application security as a discipline!

Continue Reading...

Posted in Internet of Things, Mobile Application Security | Comments Off on The timeless truth of software security fundamentals

 

FCC to investigate SS7 mobile phone vulnerabilities

On Wednesday, the Federal Communications Commission (FCC) announced it would investigate use by cellular carriers use of legacy mobile phone technology vulnerable to attack.

Continue Reading...

Posted in Mobile Application Security | Comments Off on FCC to investigate SS7 mobile phone vulnerabilities

 

Application security vs. software security: What’s the difference?

What is the difference between “application security” and “software security”? We examine the question and explain when to use each discipline.

Continue Reading...

Posted in Mobile Application Security, Web Application Security | Comments Off on Application security vs. software security: What’s the difference?

 

Apple iMessage vulnerability patched in iOS 9.3

Communications via Apple’s popular iMessage are vulnerable with a software flaw that could allow attackers to decrypt a photo stored on the company’s iCloud backup system, according to Matthew D. Green, a computer science professor at Johns Hopkins University. Green led the research team that found the bug in Apple’s encryption that would enable an attacker to decrypt photos and videos sent as secure instant messages. It would not, according to the WashingtonPost.com, allow an attacker to decrypt an entire iPhone, however.

Continue Reading...

Posted in Mobile Application Security | Comments Off on Apple iMessage vulnerability patched in iOS 9.3

 

An examination of ineffective certificate pinning implementations

While researching certificate pinning, I stumbled upon a ‘generic’ implementation flaw allowing remote attackers to bypass the protection that certificate pinning can offer to an application. Summary If your Java or Android application uses the checkServerTrusted() or getPeerCertificates() APIs to implement certificate pinning, there is a very good chance that your pinning implementation is completely ineffective.

Continue Reading...

Posted in Mobile Application Security | Comments Off on An examination of ineffective certificate pinning implementations

 

In the name of data security, Apple is fighting back

It would appear that Apple’s security strategy to protect user data is so effective that even the FBI can’t decrypt an iPhone in the midst of a terror attack investigation. The ruling came down yesterday from the federal magistrate, ordering Apple to help the FBI unlock the iPhone used by San Bernardino shooter, Syed Farook. Investigators believe unlocking the phone will lead them to more clues as to why Farook, along with his wife, killed 14 people and injured dozens at a holiday party in December of last year. Apple’s not giving in so easily. But why? Apple CEO, Tim Cook, has made it clear that he has no intention of complying with the order in a statement released yesterday. Within the statement, Cook writes that Apple doesn’t have a solution readily available, and that building the backdoor to the iPhone, as demanded by authorities, is “too dangerous to create.”

Continue Reading...

Posted in Mobile Application Security | Comments Off on In the name of data security, Apple is fighting back

 

What story do your mobile metrics tell?

Optimizing your mobile application security metrics will reveal the impact your SSG has on the security of your mobile apps, and where you can improve.

Continue Reading...

Posted in Mobile Application Security, Webinars | Comments Off on What story do your mobile metrics tell?

 

How to mitigate your third-party mobile keyboard risk

What is the best form of cyber security defense? Well, as I always maintain, it’s user awareness! The implementation of a comprehensive user awareness policy carries a lot of weight and, when abided by, effectively complements the many technological solutions available.

Continue Reading...

Posted in Mobile Application Security, Software Architecture and Design | Comments Off on How to mitigate your third-party mobile keyboard risk

 

Android WebViews and the JavaScript to Java bridge

Since a WebView is a browser control in an app, it invites traditional attacks associated with the web. We examine how to protect against these attacks.

Continue Reading...

Posted in Mobile Application Security | Comments Off on Android WebViews and the JavaScript to Java bridge

 

The top hacking techniques of 2015 and how they work

This year has been another banner year both in terms of security and vulnerability discovery. There have been many leaks and attacks, most of which were probably executed with older techniques. But, there are also a few new attack patterns worth highlighting which were revealed this year.

Continue Reading...

Posted in Mobile Application Security, Software Architecture and Design, Web Application Security | Comments Off on The top hacking techniques of 2015 and how they work