Tips To Keep Track of Code and Infrastructure Security Risks

Nowadays, most people take it as a fact that the software we use daily is secure, and that is not really representative of the reality we live in in the software industry. A lot of the software on the market today has been written with the priority of being in production as soon as possible and without much consideration for the security aspect. This neglect of code and infrastructure security risks poses a significant threat. A single security vulnerability can lead to a wide variety of problems, including data breaches, financial losses, legal concerns, and a long list of harms to customers and to companies as well.

In this article, we will go through potential security vulnerabilities that can be found in the code and in the infrastructure, specifically focusing on code and infrastructure security risks. By understanding these risks, we can better address the challenges associated with maintaining secure software systems. Additionally, we will explore some metrics that can be useful to keep track of potential security vulnerabilities and mitigate them effectively.

The Data Leakage Nightmare in AI

Nowadays, we think of artificial intelligence as the solution to many problems and as a tool that can help humanity achieve huge things faster and with less effort. Of course, those thoughts are not far from being true, but it is really important to be aware of the issues that may arise until then and how those issues can affect us humans and our environment.

Among the issues with artificial intelligence (AI from now on), one of the most relevant is called “data leakage.” This refers to a machine learning problem in which the data used to train the model (the technique that we use to predict an output from an input data set) contains unexpected information that could lead to an overestimation of the model’s usefulness when run with real data.

Native Dependency Injection in Swift

In this article, we are going to go through a couple of solutions to a common problem when developing mobile applications, and this is Dependency Injection.

We all saw a project that was calling singleton classes from any part of the code without any security when writing data to them, battling with race conditions, and coupling implementations to all these issues. You can also find many third-party libraries that can help to solve or at least manage these problems, but many times we don’t want or we can’t add extra dependencies; in this case, a good approach is to implement the solution that fits your needs in a basic but sufficient way and with native code.
To start with this, we will go through the problem first and see what would actually help us. Let’s say we have a class called AViewModel that needs to use ServiceA; the first thing to think of is to instantiate the service in the initializer or directly inside the class like this:

The Transition To The Quantum-Cryptography Era

In this article, I’ll be comparing the encryption standards we consider safe with the actual technology and what could make them not be safe anymore during the coming years. I will also try to analyze how we can prepare for the future at different scales in our industry — software development.

First of all, I want to expose the two main types of encryption that the majority of software we use relies on. This is mostly based on what the USA’s National Institute of Standards and Technology (NIST) states, as of today, in 2022.

iOS App Security Cheatsheet

In a previous article, we saw an example of how an attacker could analyze an app in the search of vulnerabilities, and perform an XSS attack through the misuse of a web view. Hopefully after reading that, if you weren’t aware of how easy it is to at least get into some source code of an app published on the AppStore, now you are and you might be wondering if there are other ways to hack an iOS application and how to prevent it.

In this article, I will try to make a compilation of stuff to check if you want to ensure your app handles the most common security flaws. We will cover the following topics: system APIs, Data Handling, Data transportation, and App Hardening.

A Simple Implementation of Remote Configuration For SwiftUI

First of all, a quick definition of Remote Configuration: It is a way to customize the behaviour of a desired system based on certain parameters that are stored on a remote location.

Many well-known libraries will give you this feature, and many of us are tempted to just integrate this big, complex, and unknown dependency without evaluating the real cost of it.