With society being forced to stay home because of the COVID-19 global pandemic, people are increasingly turning to mobile devices and applications to occupy their time. Cyber criminals are seeking out any opportunity they can to take advantage of the current circumstances and hack into devices and networks.Read More
With the increase of mobile applications being deployed, the market for application security testing tools is growing rapidly and the need for additional application protection is essential. While it is important to use application security testing tools to catch any code errors, it is not the same as protecting an application. Application protection tools are designed to make it unprofitable for a hacker to attack an application.Read More
Irdeto joined the world’s leading broadcast, satellite, content delivery, digital media, film, and...Read More
A new year has begun, and that means one thing: resolutions. Although they are known to be easily...Read More
In the dictionary, a “Window of Opportunity” is defined as “a favorable opportunity for doing something that must be seized immediately if it is not to be missed.” For video and online game publishers, the window of opportunity for a new game is pretty short. Fourteen days short, to be exact.Read More
In the latest Cloakware® Cate video Catherine shows us how commonly available tools like debuggers...Read More
How many of your online accounts or services require passwords? So many to remember. What’s your personal technique – your children’s names; adding a number each time it needs updating or a password manager?
Irdeto’s Cybersecurity Services team obtained a copy of the largest aggregated database of stolen credentials.Read More
We’ve just introduced a new Youtube video series by Cloakware® Cate. Our Senior Architect,...Read More
Why should hackers rely on finding a zero-day or unpatched vulnerability? The most common way they break into accounts or networks is by stealing credentials. What’s more they’re easy to obtain.
How are credentials stolen?
Given our addiction to being ‘always connected’, it’s no surprise that WiFi based attacks are a fertile source of stolen credentials.