Remove vulnerabilities-threats peer-to-peer-vulnerability-exposes-millions-of-iot-devices
article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

Vamosi: Hey, if you're like me you probably have a few 100 apps on your mobile device. What we're really talking about is data formatted into discrete fields, such as your name, your location, your last request for an Uber, and these external API's aren't just on your mobile devices. They're on all your devices, [Peloton commercial].

article thumbnail

The Hacker Mind Podcast: Hacking APIs

ForAllSecure

Vamosi: Hey, if you're like me you probably have a few 100 apps on your mobile device. What we're really talking about is data formatted into discrete fields, such as your name, your location, your last request for an Uber, and these external API's aren't just on your mobile devices. They're on all your devices, [Peloton commercial].

article thumbnail

Top 18 Cybersecurity Startups to Watch in 2021

eSecurity Planet

As attack methodologies evolve due to AI, machine learning and nation-state hackers , security startups are receiving a lot of funding to develop products that can secure application access for remote workers , provide real-time visibility into cyber attacks and protect data as it travels from the cloud to IoT devices. Cado Security.