With society being forced to stay home because of the COVID-19 global pandemic, people are increasingly turning to mobile devices and applications to occupy their time. Cyber criminals are seeking out any opportunity they can to take advantage of the current circumstances and hack into devices and networks.
With the increase of mobile applications being deployed, the market for application security testing tools is growing rapidly and the need for additional application protection is essential. While it is important to use application security testing tools to catch any code errors, it is not the same as protecting an application. Application protection tools are designed to make it unprofitable for a hacker to attack an application.
Irdeto joined the world’s leading broadcast, satellite, content delivery, digital media, film, and audio entertainment specialists at the 2019 CABSAT conference, and its clear piracy is still a hot topic. For the first time, CABSAT […]
A new year has begun, and that means one thing: resolutions. Although they are known to be easily broken, it is imperative that you stick to your 2019 security resolutions. It’s that time of the […]
Cracking, pirating and cheating in the world of gaming is not new, game piracy is running rampant with more than 2.5billion gamers all over the world, just over 237 million were searching for pirated content […]
In the dictionary, a “Window of Opportunity” is defined as “a favorable opportunity for doing something that must be seized immediately if it is not to be missed.” For video and online game publishers, the window of opportunity for a new game is pretty short. Fourteen days short, to be exact.
In the latest Cloakware® Cate video Catherine shows us how commonly available tools like debuggers can be used, with live data, by a hacker to effectively subvert an application. This simple demonstration captures the essentials […]
How many of your online accounts or services require passwords? So many to remember. What’s your personal technique – your children’s names; adding a number each time it needs updating or a password manager?
Irdeto’s Cybersecurity Services team obtained a copy of the largest aggregated database of stolen credentials.
We’ve just introduced a new Youtube video series by Cloakware® Cate. Our Senior Architect, Catherine, will show you the tools and techniques hackers use to reverse engineer your apps in preparation for hacking your code, […]
Why should hackers rely on finding a zero-day or unpatched vulnerability? The most common way they break into accounts or networks is by stealing credentials. What’s more they’re easy to obtain.
How are credentials stolen?
Given our addiction to being ‘always connected’, it’s no surprise that WiFi based attacks are a fertile source of stolen credentials.