Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Mobile App

Below you will find reports with the tag of “Mobile App”

image from Consumer Attitudes Toward Data Privacy Survey

Consumer Attitudes Toward Data Privacy Survey

This survey shows many American consumers are in favor of regulations designed to give them greater control over how businesses use their personal data. 78% of them were aware of the Facebook data-sharing scandal, in which political consultancy firm Cambridge Analytica gained access to private information on more than 87 million Facebook users. 94% reported being generally concerned about their data and 57% said that the scandal made them even more concerned about their data privacy and security than they were before. The survey results show that many American consumers are open to regulations designed to give them greater control over how businesses use their personal data. 69% of those surveyed would like to see privacy laws like the European Union’s General Data Protection Regulation (GDPR) enacted in the US.

(more available)
Added: November 24, 2018
image from Top Of Mind For Top U.S. Health Systems 2018

Top Of Mind For Top U.S. Health Systems 2018

To provide insight into some of the top trends in health IT, the Center for Connected Medicine partnered with The Health Management Academy to survey C-suite health system executives on health IT priorities for 2018. The quantitative and qualitative surveys focused on five areas: Cybersecurity, Consumer-Facing Technology, Virtual Care, Artificial Intelligence, and Predictive Analytics.

(more available)
Added: November 23, 2018
image from Healthcare's Most Wired: National Trends 2018

Healthcare's Most Wired: National Trends 2018

Historically, the annual Most Wired research has focused on measuring adoption of healthcare information technology to highlight those organizations with the broadest, deepest IT infrastructure. With the ever-growing need to improve healthcare, the research now adds a new emphasis on measuring key areas that can help advance the industry as well as on gathering information about organizations’ technology strategies (which include not just technology adoption but also the refinement of processes and the development of people). With this new focus, this year’s research and future Most Wired research can help identify gaps in healthcare organizations’ technology adoption and strategies and highlight areas in which the industry has opportunities to make progress.

(more available)
Added: November 21, 2018
image from Operation Electric Powder - Who is Targeting Israel Electric Company

Operation Electric Powder - Who is Targeting Israel Electric Company

From April 2016 until at least February 2017, attackers have been spreading malware via fake Facebook profiles and pages, breached websites, self-hosted and cloud based websites. Various artifacts indicate that the main target of this campaign is IEC – Israel Electric Company. These include domains, file names, Java package names, and Facebook activity. We dubbed this campaign “Operation Electric Powder“.

(more available)
Added: November 15, 2018
image from CoinMiner And Other Malicious Cryptominers Targeting Android

CoinMiner And Other Malicious Cryptominers Targeting Android

SophosLabs takes a specific look at threats being downloaded on GooglePlay that mine a mobile phone’s resources while searching for cryptocurrency.

(more available)
Added: October 26, 2018
image from Combating False Declines Through Customer Engagement

Combating False Declines Through Customer Engagement

Based on quantitative consumer research, the report looks at the likelihood that false declines at the point of sale (POS) will prompt consumers to leave their financial institution (FI). The report also looks at technologies that can reduce false declines as well as consumers’ propensity to proactively engage with these technologies.

(more available)
Added: October 26, 2018
image from Inside The Mind Of A Hacker 2.0

Inside The Mind Of A Hacker 2.0

This report takes you inside the mind of a hacker.

Added: October 26, 2018
image from Securing Smart Cities:Moving Toward Utopia With Security In Mind

Securing Smart Cities:Moving Toward Utopia With Security In Mind

This paper surveys some of the existing smart technologies currently used in smart cities worldwide. Much like our previous reports on exposed smart devices and the hacking of robots in smart factories, this paper will discuss the risks of using smart technologies in critical sectors and will provide actionable steps to help local governments and urban developers design more secure smart cities.

(more available)
Added: October 26, 2018
image from Unsecured Firebase Databases: Exposing Sensitive Data Via Thousands Of Mobile Apps

Unsecured Firebase Databases: Exposing Sensitive Data Via Thousands Of Mobile Apps

This report focuses on the Appthority Mobile Threat Team’s latest discovery, a new variant of the HospitalGown vulnerability which occurs when app developers fail to require authentication to a Google Firebase cloud database.

(more available)
Added: October 26, 2018
image from 2018 Global Study On Application Security

2018 Global Study On Application Security

Ponemon Institute is pleased to present the findings of the 2018 Global Study on The State Application Security sponsored by Arxan Technologies. We surveyed 1,399 IT and IT security practitioners in the United States, European Union and Asia-Pacific to understand the risk unprotected applications pose to businesses when running in unsecured environments and how they are addressing this risk in practice.

(more available)
Added: October 25, 2018
image from Secure The App Not The Device

Secure The App Not The Device

This report seeks to help the reader understand why, “Security should accelerate mobile adoption, not prevent it.”

Added: October 25, 2018
image from Threat Advisory: Bluclub

Threat Advisory: Bluclub

This is a threat advisory for Bluclub.

Added: October 25, 2018
image from Uber: Security Risks Come Along With Your Ride

Uber: Security Risks Come Along With Your Ride

Appthority analyzed the security risks of the Uber app and its integration with other apps in this quarter’s enterprise mobile threat update. What they found may surprise you.

(more available)
Added: October 25, 2018
image from Customer Communications Report

Customer Communications Report

This report is based on the survey results conducted by TeleSign. It seeks to understand how businesses are using cloud communications to fuel growth.

(more available)
Added: October 24, 2018
image from Enhancing Services And Protecting Data For State And Local Governments

Enhancing Services And Protecting Data For State And Local Governments

From the report, “The state and local government sectors often find themselves understaffed and underfunded to utilize technology to its fullest potential. Recent data breaches and ransomware attacks in the newspaper highlight that governments of all sizes are indeed being targeted and have fallen victim to hackers. State and local governments must be prepared to stop internal and external threats alike. The mix of legacy equipment and small IT and security staffs relative to private industry can create a pressure- filled situation.”

(more available)
Added: October 24, 2018
image from How Personal Device Data Can Compromise Company Data

How Personal Device Data Can Compromise Company Data

Beginning with the Strava cyber incident, this paper seeks to provide insight into how personal device data can cause a crisis with company data.

(more available)
Added: October 24, 2018
image from Mobile App Security via Code Injection

Mobile App Security via Code Injection

This article is fourth in a five-part series developed by Dr. Edward Amoroso in conjunction with the mobile security team from Blue Cedar. The article provides an overview of how mobile app security can be achieved through the technique of code injection.

(more available)
Added: October 24, 2018
image from Standing Up To Cryptojacking: Best Practices For Fighting Back

Standing Up To Cryptojacking: Best Practices For Fighting Back

In this paper, they explore the differences between legitimate mining and cryptojacking; how cryptojacking works; the costs of cryptojacking to today’s organizations; and practical steps you can take to avoid being a victim of cryptojacking.

(more available)
Added: October 24, 2018
image from Threat Advisory: betFIRST mobile apps

Threat Advisory: betFIRST mobile apps

This is a threat advisory for betFIRST mobile apps

Added: October 24, 2018
image from Enterprise Mobile: The New Threat Vector

Enterprise Mobile: The New Threat Vector

This paper discusses the new threat vector that has been created by bringing an enterprise into the mobile age.

Added: October 23, 2018
image from Ironclad API's:An Approach For Application Security Testing

Ironclad API's:An Approach For Application Security Testing

This paper discusses some API’s and how you can protect them from an attack.

Added: October 23, 2018
  • ««
  • «
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 00:08 UTC (build b1d7be4)