Cybersecurity - Data Privacy - IT Trends - Innovations
Business mission to the Netherlands
At the beginning of March, the founders of the TeskaLabs, Aleš Teska (CEO) and Vladimíra Tesková (COO), participated in a business mission to the Netherlands, the topic of which was cybersecurity. The agenda included meetings with representatives of companies, educational and research organizations, discussions and sharing of experience in the fight against cybercrime or a look behind the scenes of top Dutch government and private institutions.
Published on March 15, 2023
State machine miracle
How I learned what a finite state machine is and that good design is an essential part of programming.
Published on October 15, 2022
Log Management: Pre-implementation analysis
Pre-implementation analysis is a preparatory phase on the way to deploying a functional cybersecurity management system, i.e. TeskaLabs SIEM and security event management, Log Management. It is an integral and essential part of the entire implementation process, as it helps uncover any potential risks that may arise when deploying the mentioned SIEM and log management tools.
Published on September 15, 2022
SP-Lang: Category theory in the wild
We recently encountered several interesting problems that demonstrate how seemingly abstract category theory finds its practical applications and helps us solve these problems sustainably.
Published on August 20, 2022
It is necessary to maximize both security and user experience in the world of cyber security, IT and generally in the world of technologies. This requirement is closely connected to a so called *passwordless authentication* method which is an ideal balance between security and experience and is effective by limiting risk and creating user friendly environment.
Published on July 15, 2022
Engaged with ASAB
About microservices, coroutines, failures and enthusiasm. And most of all, about ASAB. ASAB is the first thing that probably every newcomer to TeskaLabs gets fond of.
Published on June 15, 2022
TeskaLabs LogMan.io: Microsoft Office 365 dashboards
Microsoft Office 365 is used daily by a large number of companies, businesses, and individuals. But only a few people know that Microsoft Office 365 provides very detailed data about who is working with them and how.
Published on May 15, 2022
How to enter the world of logs and cybersecurity.
What does it mean to log, create a corresponding dashboard and start writing JSON syntax? As I searched for answers to these questions and what were my first steps in tracing the world of cybersecurity.
Published on March 15, 2022
Don't worry, ASAB and the universe can be fixed
How do my first sprints in TeskaLabs look like? Sheer desperation quickly turns into feelings of illumination and euphoria. And back. I've also made a few new friends and learned a thing or two about flushing metrics. The digital adventure begins.
Published on February 15, 2022
TeskaLabs delivers C-ITS PKI for C-Roads in Greece
We are proud to announce that, TeskaLabs recently launched a cybersecurity solution – known as PKI – as a service for C-Roads pilot in Greece.
Published on January 15, 2022
How big Log Management or SIEM solution does your organization need
Calculate size of IT infrastructure and how much EPS (Events Per Second) generates.
Published on December 15, 2021
And the winner is...Go!
What compiled language for a backend development is the right one to move our technological stack to the next level? We've started to look around for a compiled computer language that will enable us to build microservices with higher performance. Now, don't get me wrong, we don't depart from Python at all. It is the extension of the portfolio.
Published on November 15, 2021
Case Study - TeskaLabs SIEM for large Czech government organization
TeskaLabs delivered full-fledged SIEM solution for large Czech government organization with branches all over Czech Republic and need to process at least 20,000 EPS. The delivery was successfully completed on time and on budget.
Published on October 15, 2021
The 8th version of the European Certificate Trust List (ECTL) for C-ITS has been released
The Joint Research Centre of the European Commision (EC JRC) released the eight edition of the European Certificate Trust List (ECTL) used in Cooperative Intelligent Transport Systems (C-ITS). L0 ECTL v8 contains five new Root CA certificates and one re-keyed Root CA certificate. Three out of five newly inserted Root Certificates are installations that run on the TeskaLabs SeaCat PKI software for C-ITS.
Published on September 16, 2021
TeskaLabs delivers cybersecurity for nationwide C-ITS project in Czech Republic
TeskaLabs delivers Seacat PKI, public key infrastructure security technology, for newly emerging nationwide C-ITS project in Czech Republic.
Published on August 25, 2021
TeskaLabs SeaCat PKI for C-ITS delivered to CertiLab of Czech Technical University
TeskaLabs supplies the SeaCat PKI and the dedicated C-ITS security testing tool for CertiLab, laboratory for the development and testing of technologies for Cooperative Intelligent Transport Systems (C-ITS).
Published on July 07, 2021
TeskaLabs SeaCat PKI deployment for NordicWay C-ITS pilot in Norway
In many respects, today's motor vehicles function as connected devices. With this in consideration, joint EU initiatives have broadened the impact of Cooperative Intelligent Transport Systems (C-ITS) to include more expanded connections, including road infrastructure. This enhanced connectivity is expected to result in significant improvements to both road safety and traffic efficiency.
Published on June 15, 2021
C-ITS: The European Commission is updating the list of the Root Certificates
23rd April 2021 marks the release of the fifth edition of the European Certificate Trust List (ECTL). This was released by the Joint Research Centre of the European Commission (EC JRC), and is used in Cooperative Intelligent Transport Systems (C-ITS). It is otherwise known as the L0 edition release, intended for use primarily in test and pilot deployments. Currently these activities are primarily European and focus on fields such as intelligent cars and road infrastructure.
Published on May 06, 2021
TeskaLabs helps LINET with cyber security compliance for medical devices
LINET is a major European manufacturer of hospital and nursing beds. The company´s portfolio includes solutions designed for intensive care, products for regular in-bed treatment, and also special beds for retirement homes and long-term care facilities.
Published on October 16, 2020
TeskaLabs and University hospital in Pilsen launches a pilot of zScanner - open source mobile app for medical photo documentation
zScanner is a mobile application for clinical and medical photo documentation. zScanner enables doctors and nurses to take photos of patient medical records, and of injuries of the patients, and upload them to a hospital information system. zScanner is an application created by the Institute of Clinical and Experimental Medicine in Prague (IKEM), a major Czech hospital, and the largest center of clinical and experimental medicine in the Czech Republic. During the pilot in the University hospital in Pilsen, zScanner is used at a Clinic of Oncology and Radiotherapy, and at the Clinic of anesthesiology, resuscitation and intensive medicine.
Published on September 17, 2020
EV Charging Station security demonstrator
TeskaLabs is proud to announce the availability of EV Charging Station security demonstrator. This is a result of our research project. The Meili project was part of the UK Government and its partners Zenzic and InnovateUK £1.2 million programme to develop a cohesive understanding of the challenges and potential solutions to addressing digital resilience and cyber security within Connected and Automated Mobility.
Published on July 15, 2020
Five Ways AI And Machine Learning Can Enhance Cybersecurity Strategy
Artificial Intelligence (AI) and its essential component machine learning are causing a stir in practically every industry from marketing to education. It’s no wonder designers and tech developers are finding ways to use the benefits of automated technologies to improve cybersecurity infrastructure and defend against increasingly complex and numerous cyber threats.
Published on June 24, 2020
C-ITS ITS-S Security microservice
As part of TeskaLabs‘s research activities, we are working toward a more flexible, contemporaneous method to deploy the software security component (specifically C-ITS Security) into the vehicle software ecosystem (ITS-S). The current best practice in the industry is that the cybersecurity component is integrated into the vehicle application software as a library. However, this approach brings with it many limitations, such as narrow software compatibility. The deployment is highly inflexible and so it is often omitted due to its complexity.
Published on June 15, 2020
C-ITS PKI as a Service
In many respects, todays’s motor vehicles function as connected devices. And with this in consideration, joint EU initiatives have broadened the impact of Cooperative Intelligent Transport Systéms (C-ITS) to include more expanded connections, including road infrastructure. This enhanced connectivity is expected to show significant improvements to road safety and traffic efficiency.
Published on May 14, 2020
TeskaLabs delivers cybersecurity for C-Roads pilot in Slovenia
We are proud to announce that in cooperation with DARS d.d., Motorway Company in the Republic of Slovenia, TeskaLabs recently launched a cyber security solution – known as PKI – as a service for C-ROADS pilot in Slovenia. This service is operated from a datacenter in Prague and includes Root Certificate Authority, Enrolment Authority and Authorization Authority.
Published on April 14, 2020
Creative Dock, TeskaLabs, Indermedica, Czech Ministry of Industry and Trade and Line 1212 launch the indicative test for new COVID-19 coronavirus
🇨🇿 Uchránit přetížené zdravotníky před zbytečným náporem lidí i pomoci lidem, kteří mají obavy z nového typu koronaviru, ve správném vyhodnocení symptomů a dalším postupu má nový online Indikativní test Covid-19, který vyvinuly české technologické firmy spolu s ministerstvem průmyslu a obchodu a linkou 1212.
Published on March 29, 2020
Cyber-health with a password and an antivirus program is not enough
At the beginning of December 2019, the operating system of the Benešov Hospital was crippled by a malicious computer virus to such an extent that no device could be started and doctors had to cancel all planned operations.
Published on February 14, 2020
Crypta Labs, IDIADA UK and TeskaLabs won the CAV cyber security competition
Zenzic announces consortium of Crypta Labs, IDIADA UK and TeskaLabs as winners of share of £1.2 million award for self-driving vehicle cyber security feasibility studies. The competition is part of the government’s £100 million CAM Testbed UK Fund, supporting the Future of Mobility Grand Challenge.
Published on January 27, 2020
SeaCat PKI is now Generally Available
We are proud to announce the public launch of our latest product, the SeaCat PKI. SeaCat PKI is a state-of-the-art microservice that provides central cyber security certificate and key management for IoT, connected devices, and mobile applications.
Published on January 15, 2020
TeskaLabs at the ETSI 1st C-V2X Plugtest
After a succesfull ETSI C-ITS Security plugtest at November 2019, TeskaLabs participated also at the ETSI 1st C-V2X Plugtest at DEKRA Testing & Certification Malaga Location, Spain, from 2nd to 6th December 2019. C-V2X is a new standard of how vehicles communicates among each other using a cellular network.
Published on December 15, 2019
TeskaLabs has become a leader of Mobile Healthcare applications in the Health (in) Future Platform
Cellphone instead of a filing cabinet. Until quite recently, doctors at the IKEM hospital in Prague needed to perform photo documentation by first taking pictures with a digital camera, and then downloading and/or uploading them via a computer network to patient cards. A solution to this tedious and time-consuming practice was made possible through the use of mobile scanning technology.
Published on December 10, 2019
TeskaLabs at the ETSI 7th CMS Plugtest validating C-ITS security
It is our great pleasure to announce that TeskaLabs successfully participated at the ETSI 7th CMS Plugtest at Sophia Antipolis, France, from 4th to 7th November 2019. This V2X plugtest was focused on testing C-ITS cyber security, interoperability and a validation of the European trust domain.
Published on November 15, 2019
Why Hackers Target Small Business Websites 5 Tips to Stop them
With the rise of online businesses, so does the hacking community. Many talented people with barbarous intentions from across the world develops systems with one intention in mind, to harm and attack websites and ruin the day for most entrepreneurs.
Published on October 15, 2019
How we work at TeskaLabs
How we work at TeskaLabs. We understand that our lives are finite so we focus on things that truly matters. We build the company that builds great products.
Published on September 15, 2019
TeskaLabs Achieves Globally Recognised ISO 9001:2015 Certification
The ISO 9001:2015 Quality Management System (QMS) certification which was achieved after an audit of TeskaLabs internal processes. TeskaLabs provides enterprise-grade cyber security and data privacy products for mobile and IoT applications.
Published on August 15, 2019
Making Automated Mobility Safe
Autonomous vehicles are still working their way into the modern automotive marketplace. However, they are growing more common each year. Many agree, this is an innovative change, and it’s estimated that there will be more autonomous vehicles on the road in the coming years.
Published on July 15, 2019
Connected Vehicles: Are we ready?
Connected vehicles that talk to each other, increase road safety, and rely on automation all seem like a plot from a sci-fi movie. When does the robot takeover come in? As outlandish as all of this might seem, we’re closer than ever to connected vehicles being the new normal on our roadways. In fact, by 2025, every car on the road is expected to be connected in some way, shape, or form.
Published on June 15, 2019
zScanner: mobile app for medical photo documentation with security by TeskaLabs
zScanner is a mobile application for clinical and medical photo documentation. zScanner enables doctors to take photos of patient medical records, and of injuries of the patients, and upload them to a hospital information system. zScanner is an application developed and used by IKEM, a major Czech hospital, and the largest center of clinical and experimental medicine in the Czech Republic.
Published on May 12, 2019
Asynchronous Server App Boilerplate Video Tutorial
Asynchronous Server App Boilerplate (or ASAB for short) is a microservice platform for Python 3.5+ and asyncio. The aim of ASAB is to minimize the amount of code that needs to be written when building a microservice or an aplication server.
Published on May 01, 2019
The Most Prevalent Wordpress Security Myths
WordPress web development may not seem like a challenging task. Since this platform has been in existence, a wide range of Web developers have handled projects of this nature. However, the top web development companies are not always aware of the issues and problems that take place when it comes to security.
Published on April 15, 2019
9 Usefull basics to deal with the cybersecurity
When it comes to dealing with the modern business, cyber security is more than an afterthought. Poor security standards will cost you more than just business, too; it could cost your reputation, or even your ability to trade.
Published on March 10, 2019
Future of the Automotive Mobility and Data Security
Mobility has always been at the cutting edge of human innovation and technological advancement. This is unlikely to change in the foreseeable future. Already, mobility as we know it is seeing significant disruption thanks to the entry of nontraditional players who are leveraging the power of computing devices and the Internet. But few things are likely to have a bigger impact on mobility than the enormous volumes of data that will be generated as a result.
Published on February 10, 2019
White box vs. Black box penetration testing
When it comes to hacking, there are many technical aspects that can be difficult to grasp without an extensive background in the field. One of the most common sources of confusion is the comparison between black box penetration testing and white box penetration testing.
Published on January 15, 2019
IoT, AI and Cybersecurity Are Transforming Healthcare: Here's How
Technological advances are being made on a daily basis with one goal in mind - simplifying our daily lives. Everyone now owns a computer and smartphone and thanks to the Internet, everyone has access to lots of different types of information. The medical field has benefitted greatly from this advancement in technology. Not only does it help simplify many processes which would otherwise be long and tedious to complete, it also gives doctors and the medical personnel a powerful tool which allows them to do their jobs with more security.
Published on December 13, 2018
9 Ways To Improve Cybersecurity In Healthcare
Modern healthcare is deeply intertwined with technology. From the sophisticated machines used for diagnosing disease to the enterprise systems that store patient records, it is extremely difficult to run any healthcare organization today without heavily relying on information technology.
Published on November 10, 2018
TeskaLabs Ltd was Innovate UK Funding Competition Winner in 2018
While every company is drawn to answering big questions and making new discoveries, not everyone is excited about how to get there: securing money for growth. Even with billions spent on business research and development around the world, there is considerable competition for funds.
Published on November 01, 2018
Developing a Mobile App in Healthcare
MediCat is one of TeskaLabs newest innovations and it centers around data protection and cybersecurity for the healthcare industry. In this article, we’ll explore the many use cases of MediCat.
Published on October 15, 2018
Customer interview: Read how Prodvinalco uses TurboCat.io for a file encryption
Data encryption is a critical part of GDPR compliance although there are no explicit GDPR encryption requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.
Published on September 13, 2018
TeskaLabs delivers cybersecurity for C-Roads
TeskaLabs with a great pleasure announces that we succeeded in the public tender with our product SeaCat as a supplier of cybersecurity for a C-Roads platform in the Czech Republic.
Published on August 21, 2018
Example of using BSPump with CSV files
Let us say we have a CSV file, no, wait, a lot of CSV files that are coming to our storage directory with flashing speed. We even do not have the slightest notion what names of the files are, the only thing we know is that we need to process their data and deliver them to our database as quickly as possible.
Published on August 19, 2018
Personal Data Deindetification: Pseudonymization
Pseudonymization is a critical part of GDPR compliance although there are no explicit GDPR pseudonymization requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.
Published on July 15, 2018
Building a private cloud on AMD Ryzen and Linux Containers
At our company, we develop our own software products that we offer to our clients and often also run ourselves. So far our company has operated its IT infrastructure — about 30 virtual servers—on a public cloud, specifically on MS Azure.
Published on July 01, 2018
Personal Data Deindetification: Homomorphic encryption
Homomorphic encryption is a special type of encryption invented by IBM. Encryption is a critical part of GDPR compliance although there are no explicit GDPR encryption requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.
Published on June 14, 2018
Personal Data Deindetification: Data masking (or suppression)
Data masking (or suppression) represents the de fact standard of pseudonymisation. Pseudonymisation is a critical part of GDPR compliance although there are no explicit GDPR pseudonymisation requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.
Published on June 11, 2018
Streaming Data from Various Sources
One of the main research and development topics nowadays is data processing and analysis, which can help companies discover relevant information about their customers or technologies using reports, visualizations, dashboards, and other business intelligence outputs.
Published on June 01, 2018
Personal Data Deindetification: Data Encryption
Data encryption is a critical part of GDPR compliance although there are no explicit GDPR encryption requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.
Published on May 16, 2018
Personal Data Deindetification: Anonymization
If you manage private data of any kind, you need to be familiar with the process of anonymization and how it can be used to keep the information you store safe from data breaches.
Published on April 16, 2018
TeskaLabs Annual Report 2017
TeskaLabs was very successful in 2017. Let’s start with numbers: TeskaLabs made a gross profit of $254,091 with before-tax earnings of $69,059. The company had positive cashflow in each month of the financial year 2017.
Published on March 16, 2018
CatVision.io App available in Google Play
A few months ago we introduced CatVision.io SDK for Android, a developer kit which provides an easy and secure remote access to a screen of your mobile application. In January 2018 it was followed by CatVision.io SDK for iOS.
Published on February 21, 2018
The Birth of Application Server Boilerplate
One of the most exciting tasks for our team in the last month was to create a new application server “boilerplate” that would be used as a basis for most of our growing data-processing products, as well as for other people and companies ...
Published on January 16, 2018
Pseudonymization, Anonymization, Encryption ... what is the difference?
The year 2018 will, at least in Europe, be a turning point for data privacy and personal information protection. In this article, I will focus on personal data processing. I describe methods of de-identification of personal data, such as pseudonymization, anonymization, and encryption.
Published on November 28, 2017
Google has introduced new rules about how mobile app developers and companies deal with customer impact on apps across the board. What is it?
The new regulations call for increased transparency with regards to how apps make use of customer data. Developers need to ensure that the way they handle user data - from how they collect it to what it might be used for - is perfectly clear to all users. In Google’s words, developers must “limit the use of the data to the description in the disclosure”. In layman’s terms, this means that data use and privacy policies need to be clearly visible on app descriptions in the Google Play store, and not simply within the app itself.
Published on October 10, 2017
Industrial IoT Security: Cyber Security Implications for IT-OT Convergence
In June 2017, two information security firms researching the 2016 hack of the electricity grid in Ukraine announced that they had identified the malicious code used to shut down power stations and leave thousands of households and businesses in darkness for several hours. The malware used to target the Kiev power grid has been named Industroyer, and it serves as a sobering reminder about the dangers faced by the Industrial Internet of Things (IIoT).
Published on September 05, 2017
How TeskaLabs Helped O2 Improve Customer Satisfaction of eKasa Point-of-Sale (POS), the Most Successful POS Product / Mobile Cash Register on the Czech Market
In 2016 the Czech government introduced a new law that required businesses to report their sales and provide Electronic Evidence of Sales (EET). This law calls for the adoption of a more modern point-of-sale system that enables businesses to meet regulatory requirements set forth under this law. During the next two years, the law will gradually impact more than three hundred thousand companies in the Czech Republic. O2, the largest integrated telecommunications provider in the Czech market, observed that many would need help complying with this law, maintaining data security and demanding excellent customer support.
Published on August 08, 2017
How Productive Is a Company Retreat to Tenerife for Startups?
I would like to share with you an exciting experience that we at TeskaLabs recently had. I founded TeskaLabs three years ago, as a startup focusing on building communication and security technologies for connected products such as mobile applications and IoT devices. Over that time, my team and I have witnessed so much. We’ve been a part of the TechStars program in London and worked closely with eKasa, who have tested our business and technology to its limits.
Published on July 22, 2017
Binary distributions of OpenSSL static libraries
The official source of OpenSSL software is the OpenSSL website. One can download OpenSSL source codes archives and compile them for a given platform. The compilation work can sometimes be quite tedious, especially for exotic platforms. We, at TeskaLabs, set up this page because we frequently compile OpenSSL for various platforms for our internal purposes and this may save some time to other developers.
Published on July 20, 2017
Online Fraud Is Increasing - Is Business Intelligence the Answer?
With the year on year rise in ecommerce, there is a corresponding rise in online fraud - in fact, according to Financial Fraud Action UK, this type of activity had increased by a quarter to £399.5 million in the first half of 2016. The most recent manifestation of this is the concept of “testing” - this is where the criminals try small purchases to check the validity of card details, before moving in for the kill.
Published on July 04, 2017
How TeskaLabs Helps You Operate SCADA Systems Securely and Comply with Security Laws
Cyberspace does not have boundaries. The internet is a truly international community, and it takes just milliseconds to reach a data source on a whole different continent. The internet is therefore an open arena for cyberattacks from across the world, where anyone can try to break their way into someone else’s data. We can see this daily in the news or on the specialized ICT news servers- the attacks never stop.
Published on June 06, 2017
5 Cyber Threats eCommerce Websites Should Watch Out For
There are innumerable advantages to eCommerce. Businesses can make sales outside of business hours; they can reach customers over their own personal social media pages, and take advantage of people being more inclined to spend while they’re on the couch with a glass of wine rather than harassed in the changing room of a crowded store. However, with all of these advantages, there are also some inherent threats that could annihilate a business’ reputation.
Published on May 02, 2017
Who is Responsible for Securing the Connected Car?
The automotive industry recently witnessed several cases of cyber-hacking that made driving connected cars dangerous if not impossible. Companies like Jeep, Volkswagen, and Tesla all have recently dealt with cases of hackers taking over cars and stopping them while the cars were in use as well as stealing customers' Social Security numbers, financial details, and other sensitive information.
Published on April 04, 2017
Why You Need Security Audit for Your Point-of-Sale (POS) System
It’s clear that POS systems are a source of important and valuable data, and have the power to either speed up the progress or to stop the development of a company, depending on whether or not they are used. POS data is a business asset. Despite this vital importance, such an asset is not afforded the protection it deserves.
Published on March 07, 2017
TeskaLabs Advances to Preferred Solution Partner Within the Cisco Solution Partner Program
TeskaLabs announced that it is now a Preferred Solution Partner within the Cisco® Solution Partner Program. The Internet of Everything (IoE) continues to bring together people, processes, data and things to enhance the relevancy of network connections. As a member of the Cisco Solution Partner Program, TeskaLabs is able to quickly create and deploy solutions to enhance the capabilities, performance and management of the network to capture value in the IoE.
Published on March 01, 2017
How DDoS Attacks Can Sink Your Business
Distributed Denial of Service (DDoS) is a form of cyberattack which makes the target internet service inaccessible. “Distributed” refers to the fact that the attack comes from multiple sources, to have a bigger impact on the target, as it cannot cope with such a large amount of traffic. In recent years, DDoS attacks have become more and more complex, with many combinations of different attach approaches being used.
Published on February 07, 2017
Building High-Performance Application Servers - What You Need to Know
Using scalable and reliable software is vital for the success of any large-scale IT project. As increasing numbers of transactions are made, application infrastructure needs to stand strong and support that growth, and not be another source of problems.
Published on January 17, 2017
4 Common Mobile Point of Sale (POS) Security Issues Affecting Retailers That POS Providers Need to Act On
As mobile point-of-sale applications and systems are picking up speed at retailers around the world replacing traditional one, they become appealing targets for cybercriminals allured by the amount of consumer data entered in POS systems whether through unauthorized access, mobile malware or hacking the backend.
Published on January 03, 2017
A Year in Review: The A to Z of TeskaLabs in 2016
As we approach the end of the year, we thought it would be fitting to look back and highlight the moments, people, and things that mattered most to us. Here is the A to Z of TeskaLab in 2016.
Published on December 23, 2016
SeaCat and OpenSSL Heartbleed Bug
After almost two and a half year we hope that the Heartbleed remains in the past. It is not true, unfortunately. Now we have proof that a security vulnerability remains with us for a long time, maybe almost forever even when there exist patches and fixes. The Internet is a battlefield among the good, the bad, and the ugly. Who has better attacking or defending technology wins.
Published on December 20, 2016
The Real Impacts of General Data Protection Regulation (GDPR) to EU Companies That Operate Mobile Applications
The General Data Protection Regulation (GDPR) is a new EU regulation aimed at protecting the personal data of EU citizens. Because of the broad definition of “personal data”, GDRP impacts almost every EU company, as well as non-EU companies that exchange data with them. The regulation takes effect in May 2018, which is still a long way in the future, but the complex requirements mean that companies need to start planning and taking action now.
Published on December 06, 2016
Key Areas and Best Practices to Focus for Mobile API Security
With APIs (Application Programming Interfaces) becoming a crucial factor in any web or mobile application, security feels more like a journey than a destination. Of all the constituents that encompass an application, API gateway offers easy access points for a hacker to break in and steal your data. A single error in API can cause immense problems for any organization using your API.
Published on November 22, 2016
Android Nougat: Google OS' Tightest Security Yet
Officially released a month ago, the latest Google mobile OS version has made a few major adjustments, particularly in its security features. The search giant has improved the security in the Android Nougat (or also known as Android N) from strengthening the Android itself to some tools that helps developers to keep things as it is while users install apps.
Published on November 15, 2016
TeskaLabs Joins the Cisco Solution Partner Program
TeskaLabs announced that it has joined the Cisco® Solution Partner Program as a Solution Partner. The Internet of Everything (IoE) continues to bring together people, processes, data and things to enhance the relevancy of network connections. As a member of the Cisco Solution Partner Program, TeskaLabs is able to quickly create and deploy solutions to enhance the capabilities, performance and management of the network to capture value in the IoE.
Published on November 09, 2016
5 Things You Need To Know About Securing Your Game App
The game industry is constantly evolving and growing on a rapid scale by each passing day. A significant part of this industry is mobile gaming. With huge advancements in mobile device technologies, gaming apps are on a high demand and so is their supply. One of the major reason behind this are the developers who are splurging millions of dollars in their time to market strategies. In all of this, the security of gaming apps takes a backseat, overlooked by developers in a haste a to launch their product before their respective competitors.
Published on November 08, 2016
TeskaLabs is among UK’s Top 1% Rated Startups by Early Metrics
TeskaLabs, a London and Prague-based early-stage cybersecurity company, has been awarded a score of 84 out of 100 by Early Metrics, a rating agency which specializes in startups and SMEs. This places TeskaLabs in the top 1% of startups rated by Early Metrics, joining the exclusive club of five-star startups.
Published on October 26, 2016
Want to Be a “Man in the Middle” of a Mobile Communication? It’s Easier Than You Think
Mobile are everywhere nowadays and a central part of almost everyone's lives. In fact, we are using them for everything - both for personal and business purposes. From streaming media entertains us on our way to work, to chatting with friends and family, to sending emails at work - mobiles are now effectively computers on the go. According to a study from Cisco, we are using mobile access more and more. And this trend will continue well into the future.
Published on October 25, 2016
80% of Androids Are Vulnerable to Linux TCP Flaw. But I Don’t Care!
Researchers from the University of California, Riverside, and the U.S. Army Research Laboratory have found an off-path TCP vulnerability  that affects more than 80% of Android mobile devices. Unlike a Man-in-The-Middle attack, you don't need to be in the middle of the communication to get hacked - all attackers need to know is who you communicate with.
Published on October 11, 2016
What Is Mobile Application Containerization or Wrapper, and Why It Needs to Go?
Containerization is an alternative for full machine virtualization. You probably know well-known containerization technology from Docker or Rocket. However, this article addresses the pros and cons of mobile “containerization” or wrapper used to isolate the mobile app from the mobile operating system or other applications installed on the same device. These type of “containerization” work in a different way.
Published on September 27, 2016
Is There A Network Protocol for Your Mobile Apps That Offers A Higher Security Level While Consuming Less Bandwidth Than HTTPS? Yes, There Is
For mobile apps or websites that don’t have logins, forms or features to extract data, you don’t need secure access. For banking websites, mobile apps and mobile banking services, without a doubt, secure communication is a must. But nothing is ever black and white.
Published on September 13, 2016
How to Teach Your Kids to Safely Play Pokemon GO
This summer something strange has occurred in my household. Suddenly, all of my children ranging in age from 9 to 18 are willingly piling into our van the minute I mention driving anywhere- even to the grocery store. And it’s not my company or the possibility of picking out this week’s cereal they are seeking. No, they are merely wanting a ride to aid them on their hunt for elusive Pokémon.
Published on August 30, 2016
Interview with Alex Goryachev, the Mastermind behind Cisco’s Grandest Innovation Challenge
We spoke to Alex Goryachev about the recent Innovate Everywhere Challenge, an initiative from Cisco to empower employees to think and act like passionate entrepreneurs with greater agility, speed, and risk-taking.
Published on August 16, 2016
Custom Made vs. Off-The-Shelf Mobile Apps – The Issue of Security
In October 2015, Blakely Thomas-Aguilar did a great article on mobile security statistics on the VMware AirWatch blog that can and will send shivers down your spine. For example, she found that there was an increase of 18% in the number of Android vulnerabilities between 2011 and 2015.
Published on July 26, 2016
Are You Ready for The New European General Data Protection (GDPR) Law?
A new EU regulation, European General Data Protection Regulation (GDPR) has been proposed to improve the data protection of individuals. This regulation is the subsequent to the 1995 directive. It was agreed on 17 December 2015 and its implementation starts from 2018.
Published on July 12, 2016
You Can Build Apps for the Apple TV, But Do You Know How to Do It Securely?
Apple will want to dominate the market for TV apps. To achieve this objective, it’s understandable that Apple makes it easy for app developers to create apps and games for the Apple TV platform using tvOS and profit from them just as they have already done so for the iPhone and iPad devices. Developers can leverage similar frameworks and technologies since tvOS is just a modified version of the iOS. They can even retrofit the apps that were previously developed for iOS to support the Apple TV’s tvOS.
Published on June 29, 2016
The Outrageous Cost of HTTPS - Why?
Mobile applications use HTTP communication between the application backend and the clients. Because of the demand for higher level of security, IT people implement HTTPS by setting up certificates issued by LetsEncrypt Certification Authority in their application backend server. The shift between non secure HTTP connections to HTTPS connections leads to a significant increase of amount of data being transferred from/to the clients. How is this possible?
Published on June 14, 2016
How Azure Helps Our Startup - The Perk of Being a Microsoft Bizspark Plus Member
Azure is not only for the big boys. Startups also need to get their core business off the ground and deploy intelligent solutions with little investment in the IT infrastructure. They need to deliver products to their customers as quick as possible, and they need Azure for this even more than the big companies do.
Published on May 24, 2016
We Know Why 85% of Mobile Apps Suck in Security. Do You?
In just the past 12 months, we’ve come across 100 mobile app projects at different phases. We’ve had conversations with more than 300 professionals active in the enterprise mobility space. We asked questions and uncovered the underlying problem that caused the current miserable state of mobile application security. It sucks. The answer doesn’t lie in technology but in us.
Published on May 19, 2016
Juggling A Corporate Job and A Side Business - Part 2
An interview with Mia Bennett, Head of Alliances and Special Projects, PwC, is a part of a series of interviews on enterprise innovation with corporate intrapreneurs, technology enthusiasts and visionaries within some of the world's largest companies.
Published on May 17, 2016
Security Is Driving the Adoption of Connected Cars
What seems to be a Sci-Fi movie with “talking” vehicles and “flying” machines has now become a reality. Automotive companies, seeing huge opportunity and wanting to entice their customers, are rushing to produce more car features so drivers can avoid traffic congestion, plan the next route, check the status of the car, find an available parking space, request for road assistance, or notify friends/family members/business contacts of news.
Published on May 10, 2016
Why Is Data Encryption Necessary even in Private Networks?
Securing data transferred between different endpoints is important not only through public networks but also in private networks. The data has to be protected if it is business critical or if modification or interception leads to a security incident with a high business impact.
Published on May 03, 2016
TeskaLabs Join IDEALondon Innovation Center
TeskaLabs, a London and Prague based security startup, announced today that it has joined the IDEALondon program. The program, powered by Cisco, DJ Thomson and University College of London, will position TeskaLabs among the hottest startups in Europe’s biggest technology hub.
Published on May 02, 2016
Create Unexpected Value to PwC and Expected Value to Startups - Part 1
An interview with Mia Bennett, Head of Alliances and Special Projects, PwC, is a part of a series of interviews on enterprise innovation with corporate intrapreneurs, technology enthusiasts and visionaries within some of the world's largest companies.
Published on April 25, 2016
OpenSSL DROWN Vulnerability Affects Millions of HTTPS Websites and Software Supporting SSLv2 (CVE-2016-0800)
DROWN is caused by legacy OpenSSL SSLv2 protocol, known to have many deficiencies. Security experts have recommended to turn it off, but apparently many servers still support it because disabling SSLv2 requires non-default reconfiguration of the SSL cryptographic settings which is not easy for common IT people who have limited security knowledge and don’t know the location to disable this protocol and the way to disable it.
Published on April 12, 2016
Better Late Than Never - WhatsApp Is Using End-to-End Encryption – Finally!
Can you imagine leaving your house without locking the main door while you are out? I guess not. Locking the door is a routine that we're doing automatically, so why there is so much noise about the latest update from WhatsApp that seems like the company has just reinvented communication encryption?
Published on April 07, 2016
IoT Tech Expo Europe - A Spectacular Learning Experience
The expo witnessed a high-caliber team. There were more than a hundred companies along with many speakers and attendants who came from all over the UK, Europe and even the United States to attend this expo and make it a success. The attendees got detailed info about the entire IoT / M2M industry.
Published on March 29, 2016
Integrate Charles Debugging Proxy With SeaCat Gateway
Developers of web applications often take advantage of using HTTP proxies to debug their applications. It allows them to check headers and body of outgoing requests and incomming responses and track possible flaws of their client application and server backend. You want to be able to do the same with mobile applications secured with SeaCat. Here is how you do it by integrating Charles Web Debugging into the process very easily.
Published on March 17, 2016
TeskaLabs and Chelsea Apps Factory Announce Strategic Partnership to Accelerate Secure Enterprise Mobility
TeskaLabs have announced a partnership with Chelsea Apps Factory (CAF), a company specialising in the development of mobile apps and UK’s fastest growing mobile organisation. The partnership will enable both companies to deliver value in the growing enterprise mobility market.
Published on March 09, 2016
What Does This Millennial Think About Innovation: An Interview with Matthew Bingley, Client Innovation Executive of Atos
Some people seem to be of the opinion that technological innovation has been largely iterative over the past 30 years and whilst we have achieve a great amount in terms of improving quality of life, there hasn’t been any real ‘ground shaking’ innovation. I suppose these same people are arguing that the internet is an iteration on interaction and isn’t particularly revolutionary.
Published on March 08, 2016
Application Security Issues for HTML5-based Mobile Apps
HTML is no longer restricted to just websites. With its latest edition, HTML5, the markup language family has now become a popular choice for mobile applications. After gathering the relevant data and researching, Gartner predicted two things; firstly, HTML5 would be the most commonly used language for mobile applications in 2015 and secondly, HTML5-based hybrid mobile app using technologies such as PhoneGap, Codova or React Native reach up to be 50% of all mobile apps 2016.
Published on March 01, 2016
TeskaLabs’ Technology SeaCat Unaffected by GNU C Library Security Vulnerability (CVE-2015-7547)
TeskaLabs, a Prague and London based startup in application security, today affirmed that their core products are not exposed to the GLibC flaw, a highly critical security vulnerability. There is now a rapidly growing number of IoT devices that use Linux as their operating system and inherently GLibC.
Published on February 17, 2016
Should I Use Contactless (NFC) Payment Cards?
Nowadays, almost all smartphones contain NFC (Near field communication) technology. Contactless cards use this technology when they communicate with contactless payment terminals to exchange needed information and proceed with the transaction. However, you can also do this by using your smartphone.
Published on February 16, 2016
TeskaLabs Welcomes New VP of Application Security
TeskaLabs today welcomed ICT security expert Jiri Kohout as their new VP of Application Security. Kohout will have oversight of the information security landscape, architecture design and security implementation, assisting organizations and TeskaLabs Partners to build and operate mobile solutions securely according to best practices and standards.
Published on February 11, 2016
7 Reasons Why Mobile App Security Testing Is Crucial for Enterprises
Gartner reports that by the end of 2015, 75% of mobile apps will fail basic security tests. Over 2/3 of large enterprises have been breached via mobile applications. Each security breach up costs up to $3 million/year. The estimated annual cost of mobile cyber breaches is around $50 billion, globally and increasing.
Published on January 12, 2016
The Security Vulnerability That Puts Millions of Application Backends at Risk. Yours Included
FoxGlove Security researchers published a serious vulnerability that can put millions of application backend, including mobile backend, at risk. Mobile applications use the same web-app technology for their backends, thus suffer the same vulnerability. Mobile application servers are inherently insecure because they consist of extensive stacks of software. Each piece can contain risky zero-day vulnerabilities.
Published on December 15, 2015
Czech Startup TeskaLabs Wins Global Entrepreneurship Week
TeskaLabs, a startup focused on security for mobile applications and Internet of Things, captured first prize at the 2015 Global Entrepreneurship Week (GEW) Pitch Day Start It Up! event last week. The company was recently the first Czech startup ever to attend TechStars London, a world leading accelerator. TeskaLabs launched in early 2015, through StartupYard, a leading Central European seed accelerator, in Prague.
Published on November 26, 2015
The Two Real Challenges of the Internet of Things
Every week there is a new connected device on the market. A few days ago Tag Heuer launched its smartwatch with Google, and last week I saw a €39 sleep tracker in my supermarket plaster section. Tech conferences are buzzing about the Internet of Things (Consumer Electronics Show 2015, Pioneers Festival 2015).
Published on November 24, 2015
The TalkTalk Hack: What You Need to Know
TalkTalk, one of the largest providers of broadband and phone service in the UK, has recently admitted to being the victim of a large cyberattack. For those in the United States or in another country where TalkTalk’s influence isn’t as widespread, it could be considered on the same level as a Verizon or an AT&T data breach.
Published on November 10, 2015
The Top 5 Mobile Application Security Issues You Need to Address When Developing Mobile Applications
Most recently, a lot of established companies like Snapchat, Starbucks, Target, Home Depot, etc. have been through a PR disaster. Do you know why? Simply because some attackers out there found flaws in their mobile apps and could exploit them. In fact, by the end of this year, 75% of mobile apps will fail basic security tests.
Published on November 03, 2015
Understanding the Importance and Value of Backend Security
We know that backend security is important, but what exactly constitutes the “backend?” To put it simply, the backend is the portion of a website, web application, or mobile application that exists behind the scenes. By contrast, the “frontend” of an application is everything that the user interacts with. This includes design features in the website or application, links, transactions, images, content, and others.
Published on October 06, 2015
Develop Enterprise Mobile Apps? Turn Application Security into Profit instead of Cost
More than 3/4 of enterprises have experienced mobile security breaches. These breaches cost larger enterprises approximately 3 million dollars. One reason is the build cost to properly implement mobile application security measures.
Published on September 29, 2015
iBeacons & Mobile App - The Art of Attracting More Visitors to Museum and Art Galleries
Many museums and galleries are trying to find out ways to attract more visitors. It is obvious that institutes with better and more valuable items will attract a larger audience. However, what would you suggest the smaller museums and galleries do?
Published on September 22, 2015
Security Architect Jiri Kohout: It's up to Us to Define How Secure The Internet Will Be
The security of connected applications, IoT, or mobile platforms, is based not only on secure development, but also on widespread knowledge about info security. Every user should have minimum knowledge about security. Every public tender should demand security of the final product or service.
Published on September 15, 2015
5 Things to Look for in an Enterprise Mobile Development Platform Solution
Today many enteprises are looking to have their own mobile applications. With the right solution, you can build a mobile app that will fit your organization’s needs like a glove and be in the driver’s seat of the development.
Published on September 01, 2015
Now This Is Banking at Your Fingertips
How do you currently withdraw your money from an ATM? Is there any other way, you might wonder? Some banks, like Airbank in the Czech Republic and Tatra Bank in Slovakia, are offering a new way to withdraw your money.
Published on August 25, 2015
Security Researcher Filip Chytry: Online Security Is an Unattractive Topic - until People Get Hacked
I studied at Applied Cybernetics school and worked on various fields: robotics, networks and programming. There I got curious about security and became increasingly passionate about the industry, trying to learn more about cyber crime and attempting to hack into my classmates‘ computers for fun.
Published on August 20, 2015
TeskaLabs Secures €337 K in Pre-Seed Funding
TeskaLabs, a hi-tech security startup founded in Prague, with operations in London, announced today, exclusively through Forbes.cz, that it has secured €337,000 (CZK 9.1 million) in a pre-seed funding round, from a mix of private and institutional investors. TeskaLabs, which produces cutting edge enterprise-grade security for mobile and Internet of Things (IoT) applications, is backed by noted tech accelerators StartupYard Prague and Techstars London, and Credo Ventures, a European venture capital firm.
Published on August 19, 2015
Hacking Team Getting Hacked - In Whom We “Trust”?
The hack on the Italian-based firm Hacking Team revealed that exploiting is not just done by black hats and bad hackers but can be committed by a legitimate company. A dump of 400 gigabits email revealed that the company was involved in zero-day exploits.
Published on August 04, 2015
What Happens When Hackers Hijack Your Car ... While You’re in It
What do Chrysler Jeeps, GM cars, and Tesla Model S have in common? They are now becoming giant smartphones traveling on a highway. They all have serious security vulnerabilities and can be hacked!
Published on August 04, 2015
Apple's Zero-Day Security Flaws on iOS, OS X Let Hackers Steal User Passwords
To show Apple a flaw in their environment, a team of University researchers created a malware app and uploaded it to the App Store. This malware can steal passwords from installed apps, email clients, and Google's Chrome web browser. By exploiting this flaw, hackers can bypass the App Store security check using this hacking app.
Published on July 28, 2015
Connecting the Unconnected. Securing the Internet of Things (IoT)
The Internet of Things (IoT) has unleashed new trends, and things are now labeled Smart-X (X = things). We can now connect the unconnected like cow or Barbie doll. But anything that can be connected can be hacked.
Published on July 14, 2015
Snap to It: Mobile Secure Gateway Is In Your Future
The enterprise world is changing. In the past, enterprises built their IT infrastructure as isolated data fortresses and did everything they could to prevent outsiders from accessing their data. But now they need to open that fortress to allow communication via mobile technologies. And this hole is where hackers strike.
Published on July 07, 2015
Who Benefits from Business Intelligence Mobile?
Businesses are now open to the idea of adopting BI in their mobile apps to reap the benefit from accessing real-time (or near real-time) visual representation of data and make better and faster business decisions. This article focuses on the five groups of professionals who benefit from Mobile BI: marketers, salespeople, field workers, operation managers, and executives.
Published on June 30, 2015
5 Reasons Why Security Matters When You Want to Go Mobile
Security is an essential part of today’s modern world, especially with the rise of computers and mobile devices. No one questions whether data centers, servers, and computers should be secure, so why are there so many questions about mobile security? Mobile devices face the same security threats and are, sometimes more susceptible to them. It is time to make mobile security a priority.
Published on June 23, 2015
Developers and Industry - The Two Worlds That Should Get Acquainted
Today the mobile application development business is booming. Mobile is the new cool, and every other kid knows, or wants to know, how to develop a mobile app. With the rate we're achieving now, we will soon have an app for nearly every situation in our life.
Published on June 16, 2015
Look Who's Talking! Privacy and Security Concerns Over The New Hi-tech Barbie
Our Business Development Manager, Pavel Enderle, had an interview with CT24 TV, a Czech television channel, to discuss cloud security regarding the new Barbie product, Hello Barbie. This Barbie can talk to children by using ToyTalk’s system to analyze the child’s speech and produce relevant responses.
Published on June 09, 2015
A Musing on the Deutsche Telekom Data Leakage
As the scandal of Deutsche Telekom hit the airways, some Europeans think this type of spying only happens in the United States. However, the bad news is it happens in every country in the world. Corporations have started to spy on their customers, staff, and common people like you and me.
Published on June 04, 2015
Security Issues in Nissan’s Mobile App, NissanConnect, Could Potentially Put Users’ Data at Risk
As technology continues to advance, cars are increasingly becoming integrated into our mobile devices. Automotive brands are now releasing mobile apps, allowing users to connect their music streaming services, social networks, and search engines into the car’s system. One app that I’d like to highlight is NissanConnect, a mobile application from Nissan.
Published on May 28, 2015
MazelTov and the Russian Underground Have It Going for Your Android Devices. But Not for Good Reasons
The Internet has been a good place for individuals and businesses. However, it's fast-becoming a leading medium for criminals in this cyber war against people like you and I. One example is the Russian underground that sell anything to do with cyber crime. On their websites, you can find any type of Trojans, exploits, rootkits and fake documents.
Published on May 19, 2015
A Warning about Zero-Day Vulnerability
A zero-day, also called zero-hour, vulnerability is a security flaw in the code that cyber criminal can use to access your network. Zero-day attacks call for new technologies built from the ground up for today’s advanced threat landscape. There is no known fix, and by the time hackers attack, the damage is already done
Published on May 12, 2015
Q&A: Mobile App Developers Asked How SeaCat Will Protect Their Apps, Backend, and the Data. Here Are the Answers
We've spent a great deal of time talking to mobile app developers to understand their approach to handling mobile application security. In this Q&A, we put together the answers to the most common questions asked by these app developers.
Published on May 07, 2015
Develop Secured Mobile Applications for Everything Going In & Out
Without a doubt, one of the biggest changes we are witnessing within the IT industry is that it has officially went mainstream. Whereas in the late 1990s and early 2000s, the idea of technology being so commonly and openly usable was simply a pipe dream, today just about anyone can jump onto a mobile application and get everything they need with a simple to use interface, and quick response to their queries and questions.
Published on April 28, 2015
How to Win in the Enterprise Mobility Market
At the Dublin Web Summit, I had many interesting chats with people who developed mobile apps for enterprises and large companies. Despite their differences, most had the same mindset regarding the security of their mobile apps and the backends. 'It's as secure as the infrastructure at our customers.' Is it? Let's find out.
Published on April 21, 2015
Why Developers Are Boosting Up Their Mobile Application Security?
Mobile application security is a significant issue for developers. Most try their best to make mobile apps secure and safe for their users. Here are some of the other reasons why developers are boosting up their mobile application security.
Published on April 14, 2015
SeaCat Starter Pack for iOS
Starter pack is SeaCat distribution package that is prepared to enable quick evaluation and understanding how SeaCat product works. Also it is a boilerplate for new mobile applications that are equipped with SeaCat.
Published on April 02, 2015
Situations Where Mobile App Security Best Practices is Necessary
The use of mobile app security best practices has become a necessity as app development and mobile usage continue to grow. These practices are needed to improve consumer protection, trust, and regulatory compliance.
Published on March 24, 2015
SQL Injection - Are Developers to Blame for Data Security Breaches?
Of course, this is a bold statement, but for those who deal with security issues from mobile applications, they can pinpoint where the flaw occurred with developers not taking security into account when developing mobile apps. Security takes the back seat to app functionality and remains as second thought.
Published on March 07, 2015
The Golden Age of Black Hats
I experienced a precious moment, discovering the cause which contributed to today's dire state of mobile application security. App developers think that if their apps do not deal with money, they should not have to care about app security. Is it true?
Published on February 24, 2015
What's More Important For Mobile App Developers: Prioritizing Privacy, Security or Ease of Use?
The industry of mobile app development is rising quicker than the speed of light. However, the apps seem to have problems with security and privacy even though they are easy to use. Mobile apps are developed in a few months without regards to security, privacy, or the fact they can easily be breached by hackers. Some companies have known for months about a security issue, but don't do anything until there is a breach.
Published on February 17, 2015
What Can We Do as Mobile App Developers in This BYOD Era?
Today we live in a mobile environment. There are more mobile devices connected to the Internet than human beings in the world. This has given us more freedom to choose to work from anywhere, anytime and given us the flexibility to take care of other important matters.
Published on February 03, 2015
SeaCat Tutorial - Chapter 5: Using Parse.com with REST Integration (iOS)
As the market with Cloud Computing and Mobile devices is getting bigger, there is another specific option available. It's called (Mobile)Backend-As-A-Service (BAAS) and it is extremely useful in situations we want to subscribe a complex backend service (alongside the core backend solution, there is usually a lot of additional functionality and statistics) and primary focus on development of client part of mobile apps for instance.
Published on January 31, 2015
Distributed-Denial-of-Service (DDoS) Disrupted Gaming Industry During the Holiday - What You Need to Know
During the Christmas holiday, the Xbox and PlayStation networks at Sony and Microsoft game websites were taken down by a group of hackers called Lizard squad. This attack put thousands of users out of game playing. What a bummer huh? Originally, the FBI blamed the North Koreans for taking down the network--that is another story, but had since revised their assessment when the Lizard squad claimed responsibility for the attack.
Published on January 27, 2015
Android: The One That Gets The All the Attention - Developers, Hackers and YOU
Android is considered one of the best operating systems used in smart phones. This operating system is backed by Google, the number one search engine. The Google Play has become an obsession now, enjoying the biggest number of smart phone apps. Many of them are absolutely free. But what if we tell you that Android is the easiest operating system to hack and even customized apps such as Gmail can be hacked. Recently it was checked and confirmed that Gmail is one of the top endangered apps, which can be hacked very easily.
Published on January 20, 2015
The World of Mobile Apps Is Not As Secure As You Think
Mobile app startup companies are notorious for cutting corners. One of the first things that is cut is security. After all, they have the big guys like Comcast, AT&T, and Verizon to protect mobile users, right? Wrong! All the way down the line. TechCrunch's article about security for mobile devices is an interesting theory on the state of security on the Internet. Although, they do hit the mark in the article about how companies fix the problem after the fact of the security breach.
Published on January 13, 2015
Having Fun with Your Android Apps? So Do Cyber Criminals
You love your Android phone and you love to go to the Play Store and download exciting new apps. You have also been through the Crazy Birds obsession and the Candi Crush mania. But do you know that your Android phone is not secured against the smartest of breaches: mobile app hackers. Before we go ahead and explain the intensity of this threat to mobile apps, especially Android apps, let’s have a look at the facts and figures!
Published on January 05, 2015
TeskaLabs' Security for Android Apps to Be Launched Soon!
TeskaLabs, a European startup that specializes in providing innovative software to secure mobile applications and accelerating mobility adoption, is finalizing plans to release new SeaCat Mobile Secure Gateway version for Android app, designed to enable developers to build security directly into their Android mobile application with powerful, yet easy-to-use “snappy” mobile security tool.
Published on January 05, 2015
Business Intelligence and Mobile App Security
We are a security Cat, specializing in mobile application security. You know that. In the last couple of months, we happened to stumble onto another tech domain: Business Intelligence (BI).
Published on December 26, 2014
[Video] Oracle BI Mobile App Present for Christmas
Let us share with you an update from the SeaCat kitchen. We have officially completed the integration and implementation of securing Oracle BI Mobile Solution by Christmas. Enjoy our mini video.
Published on December 23, 2014
SeaCat's Awesome Pack for Startups
Hello Startups! The thing is that,like us, you are participating in one of the most dynamic growing fields right now. You’re ready to build mobile applications for hundreds and thousands of users, extends the business capabilities to your clients and business partners, creating more business opportunities for them and for yourselves. But delivering an app, even if it is top-notch, state-of-the-art with full business features,is simply not enough. Your app will become untrustworthy the instant it is compromised by the ever-growing security threats and attacks.
Published on December 20, 2014
Save the Day and Do the Impossible - Business Intelligence Community Stays Tuned
Let us share with you fresh news from the SeaCat kitchen. A few weeks ago we had a workshop with one potential customer who was currently working on a mobile application which should access Oracle Business Intelligence (BI) suite, basically Oracle Business Intelligence Mobile HD based solution. We piloted Oracle BI SDK & SeaCat integration.
Published on November 30, 2014
What’s The Difference Between Seacat and VPN?
One of the most common questions people asked us is if SeaCat some kind of a VPN? It's not. Virtual Private Network (VPN) extends a private network across a public network, providing secure connectivity from/to a mobile device. Every application on this device, thus now has access to the private network through the channel opened by VPN. This is safe up to a certain level because it is almost impossible to ensure the integrity of every application on the devices. Especially now when there are apps for everything, and users can download them from Google Play and the Apple store.
Published on November 25, 2014
SeaCat Tutorial - Chapter 4: Using MongoDB with REST Integration (iOS)
The previous tutorial introduces several concepts and helps you understand the basic of REST API integration with iOS client written in Swift. There are several limitations, with data storage being the most important. This article provides instructions on how to work around this restriction.
Published on November 25, 2014
Cat Does School. Oldest Private University in Czech Republic Gets Cat in the Classroom. How So?
We are very happy to be part of the classroom experience for the students at Anglo-American University, the oldest private university in the Czech Republic. Final-year and visiting students taking Strategic Marketing and Planning course taught by professor Chris Shallow will work a class project offered by SeaCat.
Published on October 25, 2014
Video: A Mini Teaser of Cat
Here at the Cat quarter, we got lots of questions about Cat, wondering how Cat can be so fast, easy-to-use and affordable. So we wrote documents, emailed to address these questions. But then we got tired and played with animation instead. For now, enjoy the Catty video.
Published on October 10, 2014
SeaCat tutorial - Chapter 3: Introduction to REST Integration (iOS)
The goal of this article is to extend the knowledge and develop an iOS application which is able to comunicate with REST interface provided by Node.js that we are going to create as well. A full integration with SeaCat is essential for information security of our example.
Published on October 07, 2014
The Cat at Dublin Web Summit
We are very excited to be at the world’s largest startup event and one of the coolest tech conferences this coming November in Dublin. SeaCat was chosen by the Summit’s Alpha programme together with other highly promising startups to exhibit for free.
Published on October 03, 2014
SeaCat tutorial - Chapter 2: Simple Post (iOS)
The goal of this article is to create a simple iOS client which generates a simple POST Request which will be read in host written in Node.js and the output generated in the console. The whole comunication will be handled by SeaCat which help us to establish fast and secure connection among our key components.
Published on September 09, 2014
SeaCat tutorial - Chapter 1: Hello World (iOS)
This is the first practical tutorial in our tutorial series to demonstrate the strength and capabilities of SeaCat secure access solution. Our goal is to develop several sample applications and uncover the best practices you might be interested in.
Published on August 18, 2014
SeaCat FREE trial
In order to help you to evaluate and use our product we have prepared an trial version that is freely available for download. Trial version is limited to emulator/simulator only, you cannot use that on a real device. There is however no expiration date of a trial, so feel free to use it for any amount of time you need for the evaluation or even an actual development.
Published on August 17, 2014
SeaCat Mobile Secure Gateways' Performance Test
We decided to perform this test to validate our architectural, design and implementation decisions in regards to SeaCat performance. Our goal was to build the best-in-class product using the most advanced techniques to deliver highest possible throughput yet not compromising the security of the communication. Results of the test have been fed back into our development team to improve further overall performance characteristics of the solution.
Published on July 21, 2014
TeskaLabs Announces the Release of SeaCat Mobile Secure Gateway for iOS
TeskaLabs, a new hi-tech startup, just launched the first of its security solution for enterprise mobile applications, SeaCat Mobile Secure Gateway, enabling developers to build security directly into their mobile applications, protecting the communication channel and the backends.
Published on June 01, 2014
What TCP port to use with SeaCat?
SeaCat requires to specify one TCP port that is eventually used for client-gateway communication. Clients connect to this port to establish TLS channel that is used to exchange requests and related responses. SPDY-based communication protocol is used for traffic in this channel.
Published on May 23, 2014
SeaCat Mobile Secure Gateway Architecture
SeaCat Mobile Secure Gateway is built using the SeaCat Application Security Platform. It provides strong protection against multiple types of cyberattacks by securing all application components, including the mobile application, network paths, which present an entry point to the enterprise network and application’s backend servers. It reduces an administrator's workload with easy PKI administration of distributed large-scale mobile applications. SeaCat Security Platform has been carefully designed to be flexible, fast, and highly secure.
Published on May 18, 2014
Software architect's point of view: Why use SeaCat
I've recently received an interesting question from one software architect: Why should he consider embedding SeaCat in his intended mobile application? This turned into a detailed discussion and I realised that not every benefit of SeaCat technology is apparent at first glance. Let me discuss the most common challenges of a software developer in the area of secure mobile communication and the way SeaCat helps to resolve them. The initial impulse for building SeaCat was actually out of frustration of repeating development challenges linked with implementation of secure mobile application communication. So let's talk about the most common challenges and how SeaCat address them.
Published on April 16, 2014
SeaCat trial for iOS on Mac OSX
This blog entry is meant to help you to start using SeaCat component on your Xcode iOS development environment. It contains instructions how to install and configure SeaCat gateway and how to integrate SeaCat client into your iOS application. SeaCat gateway is a secure gate to the restricted network. It allows access only to selected HTTP hosts and prevents exposure of others. It also secures communication with SeaCat clients that are typically in the Internet. SeaCat client becomes part of said mobile application and provides secured channel to SeaCat gateway and to target hosts in the restricted network. It ensures mutual security of the connection and transferred data.
Published on March 14, 2014