When deploying (mobile) apps for verticals such as Healthcare or Banking, you typically have to get the app approved or blessed by the customer’s IT security team. Some tips or info: Only deploy, even for Proof of Concepts (POCs), properly signed apps Do…
The following is a three part series about Security and Privacy on Mobile (orig. 2012) that covers important concepts, design elements and compliance: Security & Privacy on Mobile Apps, Part 1 – Introduction Security & Privacy on Mobile Apps, Part 2 – Typical…
From Bruce Schneier on Steal This Wi-Fi: Security is always a trade-off. I know people who rarely lock their front door, who drive in the rain (and, while using a cellphone) and who talk to strangers. In my opinion, securing my wireless network…
A great essay by Schneier on definitions and concepts on cyberwar… See Cyberwar: Myth or Reality? ceo
“Simply by sending an invisible and unnoticeable SMS message to a particular cell phone, spying on cell phone users has become child's play.” Note sure the validity of this, but it's important to be aware of this security exposure… I won't be surprised…