Secure Medical Device Ecosystems: Emerging Threats And Defenses
As connected medical devices grow more reliant on APIs and mobile apps, they also become prime targets for cyberattacks.We look at real-world vulnerabilities - like exposed API keys, weak app attestation, and unprotected communications - that could allow adversaries to intercept patient data or even manipulate device behavior. Find out about critical defenses such as runtime self-protection, dynamic attestation, and certificate pinning.
Developer sues Apple to recover commission payments
A sports app developer has filed a proposed class-action lawsuit accusing Apple of illegally collecting commissions from iOS developers, despite a federal injunction allowing alternative payment systems. The suit claims Apple continued to charge unfair fees, potentially affecting billions in revenue. This Register article raises new questions about Apple’s compliance with court orders and App Store control.
The Good The Bad and The Ugly in Mobile Encryption
Encryption is the backbone of user trust and secure mobile apps. But not all encryption is created equal. In this article, we break down the good (like AES-GCM, ChaCha20, ECC), the bad (hello, DES, MD5), and the ugly (hardcoded keys, protocol downgrades) to help you navigate the crypto maze with confidence. Plus, we look ahead to the post-quantum future and what it means for your app.
Dating app Raw exposed users’ location data and personal information
TechCrunch have uncovered a major security lapse at dating app Raw, with sensitive user data exposed, including names, birthdates, dating and sexual preferences, and even precise location coordinates - accurate down to the street. The breach raises serious privacy concerns, especially as it coincides with Raw’s announcement of the Raw Ring, a wearable device designed to monitor partners’ heart rates and generate AI-driven insights into relationship fidelity.