Smart Watch Security: Shieldcast - Winter 2019

Smart Watch Security: Shieldcast - Winter 2019

Publish Date: February 27, 2019

The smart watch market is gaining much popularity these days as it is considered to be a gadget which is technical and fashionable at the same time. These multifunctional devices can send messages, use mobile apps, provide fitness stats, and much more – all while the person is driving or working out. Technologists have also predicted that in future, smart watches will act as the key to open door locks and access computers. With these kinds of sensitive functionalities at exposure, it becomes utmost crucial to understand the security aspects of such devices. With this edition of ShieldCast, we aim to educate end users about the potential security risks of using smart watches and what all it takes for security testing and securing such devices.

Tools And Techniques For Mobile Application Security Testing: Shieldcast - Fall 2018

Tools And Techniques For Mobile Application Security Testing: Shieldcast - Fall 2018

Publish Date: October 24, 2018

From the first time when we held a gaming console, to today’s smartphones with computing powers, we have seen the technology evolve. Be it for carrying out financial transactions, playing games or watching videos, we spend a lot of time on mobile phones. In fact, the loved ones don’t seem distant anymore with the calls and chats made possible by the string connecting the world: THE INTERNET. While these facilities have made our lives easier, they may expose our vulnerabilities to the dark web world. To ensure that the users are not subjected to such situations, security testing for mobile applications is necessary. This is what we will talk about in this quarterly newsletter.

Updates on RSA 2018, GDPR, and Cloud Security: Shieldcast - Spring 2018

Updates on RSA 2018, GDPR, and Cloud Security: Shieldcast - Spring 2018

Publish Date: May 30, 2018

The growth in cloud platforms has made cloud security testing a very crucial step in security assessment of cloud applications.There are some legal and technical complexities involved in security testing of such applications. Cloud security assessment is a complete evaluation of hosted application as well as platform itself. In this letter we talk about how can we do that along with some highlights from RSA conference and GDPR.

SQL Injection and IoT Security Testing: Shieldcast - Winter 2018

SQL Injection and IoT Security Testing: Shieldcast - Winter 2018

Publish Date: February 14, 2018

Manufacturers of every kind of electronic or electrical devices are rushing to add features which require connection to the internet. In their rush to market, these companies sometimes overlook the complications of hardware and software security design and construction to get the newest, coolest function working at lowest cost. While we aspire for smart cities, smart environments, smart retail or smart homes, it becomes absolutely essential for these diverse industries to evaluate the security implications of IoT in the LIVE environment. This edition will talk about IoT security testing services which are applicable across any and every domain that is ready to leverage the technology. Additionally, it will also provide testing recommendations for SQL injection and overview about BlackArch Linux.

DOS Attack And Tips To Choose Security Assessment Tools: Shieldcast - Fall 2017

DOS Attack And Tips To Choose Security Assessment Tools: Shieldcast - Fall 2017

Publish Date: October 4, 2017

Today, millions of web applications exist to make our lives easier and much more interesting. We can shop online, pay bills, chat with friends and relatives, or communicate with people all over the world. With all this provision, The “malicious” Eve is always lurking, waiting for the perfect moment to attack. In order to develop secure applications, it is necessary to use a security development lifecycle. Security should be considered and tested throughout the application project lifecycle. Shiledcast is here to help you in security testing tasks. In this newsletter, we will discuss about the things to consider while choosing security testing tool, details about DOS(Denial-of-Service) Attack and OWASP ZAP along with some latest news on cyber security.

Security Testing Report And Mobile App Penetration Testing: Shieldcast - Q1 2016

Security Testing Report And Mobile App Penetration Testing: Shieldcast - Q1 2016

Publish Date: June 15, 2016

Modern applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of application more specifically web applications stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. Security testing is therefore a very important part of testing applications. Application security testing should address all the measures that needs to be implemented throughout the entire software development life cycle, so that vulnerabilities may be addressed in a timely and thorough manner. SHIELDCAST: The quarterly security Newsletter from QASource; delivers the best practices, latest updates, tips and the knowledge required for security testing of applications: be it Web, Mobile or Desktop.

Protecting Yourself from Common Security Shortfalls

Protecting Yourself from Common Security Shortfalls

Publish Date: December 15, 2015

Cyber attacks and other forms of malicious hacking are becoming more and more common. Because the exchange of login credentials and the transfer of precious data is often necessary when engaging with an outsourced QA team, strict security measures must be in place to ensure that there is no risk of a breach. A good QA partner ensures that your application's code is safe, secure, and strongly protected at all stages of testing. Though most organizations are vigilant and have strong security implemented to cover the major points of risk, there are some commonly overlooked areas that should not be neglected. In this post, we look at the damaging effect of poor security and the solutions that will prevent it.

Authors

Our bloggers are the test management experts at QASource. They are executives, QA managers, team leads, and testing practitioners. Their combined experience exceeds 100 years and they know how to optimize QA efforts in a variety of industries, domains, tools, and technologies.

We use cookies to optimize user experience. Click on "Agree and Proceed" to confirm, OR, by continuing, you implicitly accept cookies.