security


Why CTOs Need to Think About APIs Before Websites

By moving the primary focus from your website to your API, your organization will be far more prepared to thrive in the mobile revolution. I came out of college right at the exciting explosion of the web. Most people paid little attention to it, Wired looked like this, and my family would get excited when …

Why CTOs Need to Think About APIs Before Websites Read More »


Using Libraries in Mobile App Development

Here’s how your reusable code can be made easier with libraries. If your organization has more than a single app or a number of common areas of functionality/APIs, you need to think of how to manage your codebase smarter by using reusable libraries. Too often libraries are thought of as exclusively open-source projects that solve …

Using Libraries in Mobile App Development Read More »


Apple to refund $32.5m to parents

Apple to refund $32.5m to parents Apple settled recently with the FTC about refunding In-App purchases made by children on their parents’ accounts. Tim Cook said they settled because it was what they were planning to do anyway and he wanted to avoid a lengthy lawsuit. For background, in previous versions of iOS, there was …

Apple to refund $32.5m to parents Read More »


What’s really going on with the Starbucks mobile app information leak, and what you need to know

What’s really going on with the Starbucks mobile app information leak, and what you need to know With Starbucks’ app being the clear leader in mobile payments, any word of a possible lapse in security is bound to get news. Nick Arnott breaks down what really happened and what the real security risks are. 


ongoing by Tim Bray · Surveillance and the Media

ongoing by Tim Bray · Surveillance and the Media Tim Bray weighs in on the whole NSA surveillance brouhaha. Of course these overwhelming and intrusive levels of surveillance are costing American companies – there are always hidden costs to government intervention. The internet as a whole – but US internet companies in particular – will …

ongoing by Tim Bray · Surveillance and the Media Read More »


Researchers Discover Many iOS Apps Vulnerable to HTTP Request Hijacking | SecurityWeek.Com

Researchers Discover Many iOS Apps Vulnerable to HTTP Request Hijacking | SecurityWeek.Com Important note on security and hacking through http redirects, but there doesn’t seem to be that much that is brand new or particularly of special concern to apps. It would appear it’s just that so much http is happening behind the scenes in …

Researchers Discover Many iOS Apps Vulnerable to HTTP Request Hijacking | SecurityWeek.Com Read More »


Easy peasy? « John Moltz’s Very Nice Web Site

Easy peasy? « John Moltz’s Very Nice Web Site John Moltz is spot on in his brief take on TouchID. The important point to remember is that it’s not competing with theoretical maximum security but with no PIN whatsoever, or with a simple 4-digit PIN that’s easy to spot over your shoulder. His camera analogy …

Easy peasy? « John Moltz’s Very Nice Web Site Read More »


The “S” In iPhone 5S Stands For “Sensors”

The “S” In iPhone 5S Stands For “Sensors” Good post on the surprising potential of the sensors in the new 5s. The fingerprint sensor is, of course, quite intriguing as it unlocks easy access to a lot more security (setting a pass code is integral to the file-system encryption on the iPhone, yet few users …

The “S” In iPhone 5S Stands For “Sensors” Read More »