article thumbnail

Frucor Suntory amplifies sales and service with a unified mobile app

CIO Business Intelligence

Early in my career, I stayed in an authentic ryokan inn in Kyoto. Unifying four siloed sales tools into one iOS mobile app for easy access to data Frucor Suntory’s outdated on-premises custom sales automation system scattered information across multiple tabs and locations.

Mobile 115
article thumbnail

Why ‘deepfake geography’ presents significant risks — and how researchers are detecting it

GeekWire

Techniques such as “location spoofing” and deepfake geography present significant risks for our increasingly connected society. Half of these were authentic images of the three cities. For instance, several mobile apps already exist for just this purpose. and Beijing.

Research 129
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Research Uncovers 3,200+ Mobile Apps Leaking Twitter API Keys

SecureWorld News

New research from security firm CloudSEK shows that more than 3,200 mobile applications were leaking Twitter API (Application Program Interface) keys, which can be used to gain access and take over user accounts. Now when the app is presented with the color purple, it will know that red was involved too and hence it is valid.

article thumbnail

Passwords Are Ruining the Web

Phil Windley

Compare, for a moment, your online, web experience at your bank with the mobile experience from the same bank. Chances are, if you're like me, that you pick up your phone and use a biometric authentication method (e.g. As a consequence, when I need somethings from my bank, I pull out my phone and use the mobile app.

article thumbnail

Cybersecurity Tips to Avoid Fouls During March Madness

SecureWorld News

Between checking scores, streaming games, participating in office pools, and inevitably some placing of bets, users will be presenting an abundance of new openings for threat actors to attack. These can be vehicles for delivering malware, committing fraud, or harvesting valuable data.

Sports 86
article thumbnail

Customer Passwords are a Target for Cybercriminals: How to Address the Threat

CIO Business Intelligence

However, cybercriminals commonly take the path of least resistance, and organizations’ reliance on password-based authentication provides numerous avenues of attack. Passwords are known to be a weak form of authentication, and the widespread use of weak and reused passwords puts companies and their customers at risk.

article thumbnail

Critical Assets Highly Exposed in Public Cloud, Mobile, and Web Apps

SecureWorld News

CyCognito has released its semi-annual State of External Exposure Management Report , revealing a staggering number of vulnerable public cloud, mobile, and web applications exposing sensitive data, including unsecured APIs and personally identifiable information (PII). Regular Backups: Regularly backup PII and other essential data.

Mobile 87