social.coop is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Fediverse instance for people interested in cooperative and collective projects. If you are interested in joining our community, please apply at https://join.social.coop/registration-form.html.

Administered by:

Server stats:

480
active users

#appsecurity

0 posts0 participants0 posts today

🔒 Verizon call log exposure was more than a bug—it was a real-time surveillance risk.

A serious flaw in Verizon’s pre-installed Call Filter iOS app allowed unauthorized access to detailed incoming call logs of any Verizon user.

Discovered by ethical hacker Evan Connelly in February and patched in March, the issue:
📱Affected millions using the app to block spam and ID unknown numbers
📂 Could have exposed call histories of journalists, law enforcement, and public officials
🚨 Raised massive concerns around privacy and real-time surveillance

Verizon confirmed the fix, but experts stress this as a wake-up call for rigorous mobile app security—especially those preloaded at scale.

👉 newsweek.com/verizon-expose-cu

Newsweek · Has Verizon Exposed Your Call History? What To KnowBy Dan Cody

Angular Security: 5 Practices Every Developer Should Know

tuvoc.com/blog/angular-securit

Enhance your Angular applications with top security practices every developer should know. Learn how to prevent common vulnerabilities and protect your app from threats.

#Angular
#WebSecurity
#CyberSecurity
#AngularBestPractices
#SecureCoding
#FrontendSecurity
#JavaScript
#WebDevelopment
#AppSecurity
#DataProtection
#SecurityBestPractices
#CodingTips
#SecureWebApps
#AngularDevelopment
#DevSecOps

🕵️‍♂️ Discovering vulnerabilities in your Spring Boot projects? This comprehensive guide from Snyk has got you covered. Find out how to secure your dependencies and keep your applications resilient.. Check it out! 👉 buff.ly/3sUMQfc #JavaDevelopers #AppSecurity

Snyk · Handling security vulnerabilities in Spring Boot | SnykIn this blog, we'll demonstrate the best way to find and remediate open source vulnerabilities in Spring Boot.

In India at least 60 people have killed themselves because of the harrassment and violations to their privacy by instant loan collectors.

"There are many apps that promise hassle-free loans in minutes. Not all of them are predatory. But many - once downloaded - harvest your contacts, photos and ID cards, and use that information later to extort you.

When customers don't repay on time - and sometimes even when they do - they share this information with a call centre where young agents of the gig economy, armed with laptops and phones are trained to harass and humiliate people into repayment."

#privacy #scam #instantloan #app #appsecurity #security #securitybreach #news

bbc.co.uk/news/world-asia-indi

BBC News · Inside the loan app scam that blackmails with nudes - BBC NewsAt least 60 people have killed themselves in India after being extorted by a global racket.

📢 New blog post alert! 📢

Check out our latest blog post "A Deep Dive into Penetration Testing of macOS Applications (Part 2)"! 🕵️‍♀️🖥️🔍

In this post, we discuss code signing mechanisms, code signature flags, and file and memory analysis techniques and tools. 💻🔒💡

Learn how to identify potential vulnerabilities and strengthen your macOS application security! 💪

Read the full article here: cyberark.com/resources/threat-

www.cyberark.comA Deep Dive into Penetration Testing of macOS Applications (Part 2)Introduction This is the second part of the “A Deep Dive into Penetration Testing of macOS Application” blog series. In the first part, we learned about macOS applications and their structure and...