Google recently introduced new tools for developers to help them create a better web content security policy. Specifically, the initiatives should target cross-site scripting (XSS) vulnerabilities, which Threatpost said are the “cockroach of...
The new Google API allows a network service to obtain a hardware-backed cryptographic guarantee of the identities of a device and the user accessing it.
August saw many shifts in the mobile security landscape, including several new launches, threats and other snippets providing insight into upcoming trends.
WPAD is an easy way to grab proxy information and get browsers online. When it comes to security, however, this protocol doesn't make the grade.
A security researcher discovered that the Qualcomm-made chips at the center of Android encryption can be exploited in a sophisticated attack.
More ad providers are moving to HTML5 to prevent malvertising, but this shift alone isn't enough to deter cybercriminals from their exploits.
AppConfig Community now supports Android for Work, sharing best practices for developers to refer to when configuring and securing Android mobile apps.
When you hire a third party for some IT work, do you really know about their vendor security practices? Google certainly does.
Short URLs were created to help users have an easier and smoother experience, but cybercriminals can benefit from the concept, as well.
Shifting to HTTPS is vital for websites, but many organizations are not implementing it properly and leave users at risk as a result.