01.06.2020 Views

Cyber Defense eMagazine June 2020 Edition

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Organizations that neglect security do so at their peril. Certainly, they may be able to get apps in the<br />

hands of end-users faster without adding security protections, but should an attacker compromise their<br />

app, the damage to their reputation and their revenue stream could far outweigh any advantage. Brands<br />

whose apps have suffered security breaches must often spend millions repairing their brand, fighting<br />

lawsuits and compensating consumers, not to mention the danger they face having their own data stolen<br />

or encrypted for ransom. In fact, attackers are already taking advantage of the pandemic and people’s<br />

increased reliance on mobility. For example, a recently released Covid-19 tracking app turned out to be<br />

ransomware.<br />

One of the big problems, of course, is knowing where to start. It can feel overwhelming. After all, a<br />

development group can spend months fixing hundreds of vulnerabilities, while a cybercriminal only needs<br />

to find one to mount a successful attack. But while you can’t necessarily anticipate every possible attack,<br />

you can address the most serious vulnerabilities, and the Open Web Application Security Project<br />

(OWASP) has already identified the most important vulnerabilities found in mobile apps. Protecting<br />

against these will significantly increase the security posture for your apps.<br />

Broadly speaking, here are the areas that require the most attention:<br />

Reverse engineering and app tampering protections: Most apps are not protected against attempts to<br />

probe them to discover exactly how they work. By tampering, debugging and reverse engineering apps,<br />

hackers can not only identify promising vectors for attack, but they can also create malware that closely<br />

resembles the real app, which they can then distribute to end-users. Using techniques such as app<br />

shielding, developers can prevent hackers from gaining access to the internal operations of their apps.<br />

It’s critical to make sure app shielding is properly implemented, however, because if it’s done poorly,<br />

hackers can turn off the protections it provides.<br />

App shielding is best implemented alongside code obfuscation, which makes an executable unintelligible<br />

so that hackers are unable to read the source code and glean useful information. Together, these two<br />

measures can prevent hackers from picking an app apart to recreate it or identify coding vulnerabilities.<br />

Securing data storage: End-users are very concerned about the security of their personally identifiable<br />

information (PII) such as passwords, bank accounts and credit card numbers … and they should be. In<br />

many apps, this information is stored on the device without any protection at all. As a result, anyone who<br />

can get into the phone — a trivial task for a sophisticated hacker in possession of the device — can read<br />

or export all the data it stores. For the most part, that’s what thieves are after when they steal a device.<br />

They can make much more money off financial fraud and credential theft than they could by simply selling<br />

the device on the black market.<br />

Data on the device must be encrypted, both at rest and in use, which means data will be completely<br />

unreadable to anyone who does not possess the encryption key to decode it. It’s important to use strong<br />

security, as older encryption algorithms may be vulnerable to cracking. The Advanced Encryption<br />

Standard using encryption keys that are 256 bits in length — known as AES-256 encryption — is the<br />

industry standard.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 40<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!