Tweaking (extended) Isolation Forests

Introduction This blog post focuses on the optimization process and evaluation of a single component used for outlier detection. We implemented our own forest inspired solution as part of our meta learning framework. Although our usage and applied implementation are quite different, we share the (fun part of the) journey. We will limit the scope of the blog post, and...

Quantifying the Cost of (Almost) Stolen and Tampered Apps

Since the global launch of AppSolid® in 2016, the mobile app security solution has been hard at work protecting various Android and iOS applications. These hardened applications are distributed across different industries, such as finance, gaming, healthcare, and enterprise-class customers. It has been 3 years since AppSolid® emerged on the mobile application scene, and we thought it’s about time we...

The Current Security State Of Top Fitness Mobile Apps

In January 2018, the news broke out that Strava, a social fitness tracking app exposed the locations of US military bases around the globe. After the media reports, the company actively worked on improving privacy and security oversights by implementing restrictions on viewing and added an opt-out option for displaying user data on its heat map. Those were all good...

10 Most Common Web Security Vulnerabilities

*This article was originally written by Gergely Karman at TopTal.  For all too many companies, it’s not until after a security breach has occurred that web security best practices become a priority. During my years working as an IT Security professional, I have seen time and time again how obscure the world of web development security issues can be to...