Tag Archive for: applications

Apple Taking Applications Now, But There’s A Catch


If you want a free iPhone 14 Pro, with no carrier contract locking you in for 12 or 24 months, your legal options are pretty limited. If you want that iPhone so as to be able to hack iOS while using it, however, Apple is now offering just that opportunity. But you’ll need to be quick; applications close on October 31. You will also need to meet a bunch of eligibility criteria. Here’s what you need to know.

09/02 update below. This article was originally published on August 31.

Apple’s Hackable iPhone 14 Pro

As part of Apple’s claim that the iPhone is “the world’s most secure consumer mobile device,” it created the Apple Security Research Device Program. This acknowledges that the security protections in place make it hard for security researchers to get started when looking for iOS vulnerabilities that malicious actors could exploit.

The Apple SRD is a custom iPhone 14 Pro that enables researchers to look for ways to hack iOS without having to bypass those built-in security features. What this means is that this particular iPhone 14 Pro is fully hackable by those with the requisite skills to find new iOS vulnerabilities. It provides shell access, for example, and even the ability to mess around with the kernel. Any vulnerabilities found must be reported to Apple and will be eligible for financial reward as part of the Apple Security Bounty program.

MORE FROM FORBESGoogle Warns Gmail Users Ahead Of New Security Alerts-Set Up 2FA Now

Eligibility Criteria For The Apple Security Research Device Program

Such a device is a valuable item, especially if it were to fall into the wrong hands. So, you won’t be surprised to learn there are strict guidelines regarding usage, as well as who is eligible to apply for a 12-month free iPhone 14 Pro loaner.

When it comes to eligibility, applicants must already have had success when it comes to vulnerability research. This success can be on Apple platforms or other operating systems such as Android, for example. You can’t have been employed by Apple within the previous 12 months or be a current employee. Finally, there’s a list of countries which Apple will…

Source…

Palo Alto Networks teams with Google Cloud to provide secure access to applications


Palo Alto Networks Inc. today announced a new partnership with Google LLC Cloud that combines BeyondCorp Enterprise from Google Cloud and Prisma Access from Palo Alto Networks to provide hybrid users with secure access to applications.

Built on the backbone of the Google Cloud network, the cloud-delivered Zero Trust Network Access 2.0 solution is said to enable users to work securely from anywhere, regardless of device type. Tapping into Prisma Access, customers gain access to ZTNA 2.0 security for all devices, branch offices and applications. With the inclusion of BeyondCorp Enterprise Essentials, users can secure access to applications and resources for unmanaged devices.

The pairing combines threat intelligence and machine learning that automatically detects and remediates threats to users, applications and enterprise data, powered by low-latency connections on Google Cloud. “Legacy VPN and ZTNA 1.0 solutions provide access to users that are too broad and lack continuous security inspection, putting cloud-first and hybrid organizations at risk,” explained Kumar Ramchandran, senior vice president of products at Palo Alto Networks.

Also announced today by Palo Alto Networks at its annual Ignite Conference in Las Vegas was Prisma Cloud Secrets Security. A cloud-native application protection platform, the solution taps into signature-based secrets detection, observing events and identifying patterns that match the signatures of known attacks, and an entropy model that measures the amount of uncertainty an attacker faces to determine the value of a secret.

Prisma Cloud now scans all files, including “infrastructure as code” and source files, to deliver a solution that offers full application lifecycle protection. The service does so by scanning for hardcoded in-code pre-commit, version control systems and continuous integration pipelines.

The service additionally alerts users to exposed secrets in cloud works and resources using built-in runtime policies. Key features include application programming interface risk profile for cloud-native applications that rely on APIs for communication.

Prisma Cloud now has enhanced web application and API security capability with…

Source…

How to Code Sign Your Applications for Adobe AIR?


Code Signing for Adobe Air: Understanding the Process & How and Where to Purchase the Code Signing Certificate

Adobe Air is one the best runtime environments that can be used to build quality applications for web and mobile. It aids developers with several valuable features and components to make development easier and more effective.

However, running apps built in Adobe Air without security warnings is only possible through a legit Adobe code signing certificate. It ensures that your application code is safe and has not been tampered with and the app is safe to use.

Hence, purchasing an Adobe code signing certificate to run apps on Adobe Air is necessary.

How to Code Sign Your Apps for Adobe Air?

Cutting down to the chase, let us simply start with understanding the process of code signing for Adobe Air:

Step 1: Researching the Right Adobe Code Signing Certificate

To start with the process, you first must do a little research and find a suitable code signing certificate that will help you sign Adobe Air apps. Remember, you need to buy a certificate that supports the Adobe Air platform. Hence, make your research Adobe specific and decide which certificate is suitable for your application. Here are three options to choose from:

Step 2: Purchasing the Adobe Code Signing Certificate

After deciding which certificate is ideal for code signing for Adobe Air apps, you can make the actual purchase. Note that buying a code signing certificate for your Adobe Air apps will help you prevent the security warning messages that appear while installing or running the app on the web or mobile platforms.

Step 3: Learning the Process to Code Sign Adobe Air Apps

To sign your Adobe Air apps with an Adobe code signing certificate, you will first need to export your certificate as a .PFX file from the internet browser you are using. Once you have the .PFX file, you can use it to code sign Adobe Air apps.

Here is the process to export .PFX file from different internet browsers:

A. Microsoft Edge

The following is the process to export .PFX file from Microsoft Edge:

  1. Open the Microsoft Edge browser.
  2. Go to the upper right corner of the browser, click on the three dots, and select Settings.
  3. Select the…

Source…

Sitare University Invites Applications for Inaugural Batch: B.E in Computer Sciences


To provide 100% scholarships to all deserving underprivileged students

Course specialization include new-age technology fields such as AI, Systems, Human Computer Interaction, Data Science and Computer Security

Sitare University, a new age Computer Science focused university, today announced admissions applications for its first academic batch 2022-23. Targeted towards bridging the huge supply-demand gap for premium tech talent, Sitare University believes that every deserving student should be able to pursue a degree in Computer Science, if they want, irrespective of their socio-economic background. The University will provide 100% scholarships to all deserving underprivileged students gaining admission into the four-year Bachelor of Engineering in Computer Science. The university plans to focus on creating future-ready and relevant industry talent across five specialized domains AI, Systems, Human-Computer Interactions, Data Science, and Computer Security.

While announcing the admissions Amit Singhal, Co-founder, Sitare Foundation and Co-founder, Sitare University said, “Our vision behind Sitare University is to empower India’s bright underprivileged children by providing them with an opportunity to study industry-leading Computer Science courses that are at par with globally acclaimed standards. I’ve always been a firm believer in the fact, that only through education can we truly unlock the full potential of any individual. We at Sitare University wish to do the same by helping young underprivileged children gain relevant industry exposure and knowledge.”

During the initial phase, students will be enrolled in a four-year Bachelor of Engineering degree in Computer Science at the partnering University Rajiv Gandhi Proudyogiki Vishwavidyalaya (RGPV), Bhopal. The faculty includes industry stalwarts and internationally acclaimed academia such as Vishal Sikka, Former CEO Infosys and Founder and CEO of Vianai Systems; Vijay Shekhar Sharma, Founder and CEO of One97 Communications; Dr. Ben Gomes, Senior Vice President at Google; Kiran Panesar, Director of Engineering at Cohesity; Dr. Krishna Bharat, Distinguished Research Scientist at Google; Ajeet Singh, Co-founder and Executive…

Source…