Overview of M-Commerce Market
26.09.2018
Mobile commerce or m-commerce is not a brand new trend anymore. Some people consider that its era is over and this exhausted market will not offer anything new. I belong
Read MoreHow spammers get your data from health and fitness apps?
20.11.2017
Do you have a health and fitness application installed on your smartphone? Do you monitor your sleep cycles, count calories and track your activity using an application? Or do you
Read MoreForget the password? Then scan your finger
01.11.2017
How do you unlock your smartphone? Do you enter the password or use fingerprint authentication? How do you confirm a transaction in your banking application? Do you enter a correct
Read MoreCan cyber security culture ensure hacker’s wipeout?
01.06.2017
Recent successful cyber attacks force to change the attitude to cyber security culture that is closely connected with the company’s culture as well. Poor corporate culture evokes not only problems
Read MoreSecurity Testing Tools You Need to Know
26.04.2017
The statistics of cyber attacks of the recent years shows that hackers broke 1061 blogs and websites in 2015 and 1017 ones in 2016. But when your website is hacked,
Read MoreHacking: Pluses and Minuses
20.04.2017
Nowadays hacking is rather popular. Some people are engaged in hacking activity because of personal illegal profit, using confidential or personal information for blackmailing or something like this. For others,
Read MoreWhat Are the Threats of Software Security?
22.03.2017
The main aim of security testing is to remove all critical flaws in the security system of software products. The specialists apply different techniques and methods in order to detect
Read MoreWhat Is WPA (Wi-Fi Protected Access)?
03.03.2017
Wireless networking has become very popular and many people were and still are not interested in the way the data is sent through the air and how this information can
Read MoreSecurity Testing Tools
23.02.2017
Nowadays, security of personal and corporate data plays an important role. And a huge attention is paid to thorough penetration testing, security testing, access control testing, etc. To check whether
Read MoreSecurity Testing Myths
15.02.2017
For various specialists, the notion ‘security’ has different meaning and includes diverse concept. In general, security means the combination of specific means that protect the product from malicious attacks and
Read More5 Open-Source Mobile App Security Testing Tools
09.02.2017
To secure mobile applications from various attacks is not a simple task. Modern programs and apps pass thorough security testing in order to define the weak point of the system.
Read More