Remove category web-development
article thumbnail

Security Analysis of Threema

Schneier on Security

We discuss remediations for our attacks and draw three wider lessons for developers of secure protocols. Threema developers advertise it as a more secure alternative to Meta’s WhatsApp messenger. Threema developers advertise it as a more secure alternative to Meta’s WhatsApp messenger.

article thumbnail

Quick Threat Model Links October 2019

Adam Shostack

Continuum has a blog and a spreadsheet on threat modeling lambdas (as a category, not specific to Amazon Lambda), and also a post on threat modeling with CAPEC. Omada Health has released an interesting threat model (“INCLUDES NO DIRT”) for medical device modeling. What else have you seen?

189
189
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Differences in App Security/Privacy Based on Country

Schneier on Security

One hundred and eighteen apps varied in the number of ad trackers included in an app in some countries, with the categories Games, Entertainment and Social, with Iran and Ukraine having the most increases in the number of ad trackers compared to the baseline number common to all countries.

Mobile 316
article thumbnail

Top 10 web application vulnerabilities in 2021–2023

SecureList

To help companies with navigating the world of web application vulnerabilities and securing their own web applications, the Open Web Application Security Project (OWASP) online community created the OWASP Top Ten. Most of the web applications were owned by companies based in Russia, China and the Middle East.

article thumbnail

Understanding Malware-as-a-Service

SecureList

The Malware-as-a-Service (MaaS) business model emerged as a result of this, allowing malware developers to share the spoils of affiliate attacks and lowering the bar even further. Ransomware ranks second in terms of activity on the dark web, showing an increase since 2021.

Malware 128
article thumbnail

FISMA Compliance: A Complete Guide to Navigating Low, Moderate, and High Levels

Centraleyes

Department of Commerce responsible for developing and promoting standards and guidelines to enhance the security and interoperability of information systems. To address this, NIST developed FIPS-199, “Standards for Security Categorization of Federal Information and Information Systems.”

Risk 52
article thumbnail

7 keys to selecting a low-code platform

InfoWorld on Security

But there are also times when the business and technology teams should consider low-code and no-code platforms to accelerate development, provide out-of-the-box technical best practices, simplify devops, and support ongoing enhancements. Low-code platforms come in several categories.

IoT 98