Hacktivist Protests Poor Security Practices

Kelly Strain

security ghost in the shell

 

GhostShell leaked an estimated 36 million account details from 110 poorly configured MongoDB servers. This hack, dubbed Project Vori Dazel, marks one of the largest breaches this year.                                                                                                                          

“I am leaking more than 36 million accounts/records of internal data from [networks] to raise awareness about what happens when you decide not to even add a username and password as root or check for open ports, let alone encrypt the data.” GhostShell via Pastebin

Continue reading

User Data Security: Everything You Need to Know

Kelly Strain

Software security is a big deal (167 million LinkedIn user account details are currently for sale on the dark web). Most applications fail to secure user data sufficiently, leaving them vulnerable to attacks resulting in dire consequences.

To combat this issue, we are excited to announce the release of our complete 2016 Guide to User Data Security. The guide compiles everything our development team knows about server and application security and delivers step-by-step code to help you secure your user data. It covers key concepts such as server architecture, firewalling, intrusion detection, password security, two-factor authentication, social hacks, SQL injections and more.

Continue reading

3 Trends Shaking Up App Development in 2016

Brian Pontarelli

3 trends shaking up app development in 2016

With the number of apps and mobile users projected to increase exponentially, developers who create the most advanced technology fastest will gain the competitive edge needed to stand out amongst competition.

The software industry is ever-changing. The field is highly dynamic, focused on building and changing the way we live, work and play. 2015 was a tumultuous year for developers.

IT was impacted by innovations from within as well as external factors, such as increased government regulations and cyber-crimes originating both in the U.S. and abroad.

Continue reading