A beginner-friendly intro to the Correlator for effective cybersecurity detection

At TeskaLabs, we know that a cybersecurity system is only as effective as its ability to detect threats. That's why we developed a powerful tool that will prove essential in your arsenal: the Correlator.

Continue reading ...

security tech

Published on March 15, 2024


Latest Posts


Inotify in ASAB Library

From blocking read challenge, ctypes and bitmasks to a solution that enables the ASAB framework to react to changes in the file system in real time.

Continue reading ...

asab development tech eliska

Published on August 15, 2023

Business mission to the Netherlands

At the beginning of March, the founders of the TeskaLabs, Aleš Teska (CEO) and Vladimíra Tesková (COO), participated in a business mission to the Netherlands, the topic of which was cybersecurity. The agenda included meetings with representatives of companies, educational and research organizations, discussions and sharing of experience in the fight against cybercrime or a look behind the scenes of top Dutch government and private institutions.

Continue reading ...

press

Published on March 15, 2023

From State Machine to Stateless Microservice

In my last blog post, I wrote about implementing a state machine inside a microservice I call Remote Control that will automate deployments of our products and monitor the cluster. Here I would like to describe how all this was wrong and why I had to rewrite the code completely.

Continue reading ...

development tech eliska

Published on February 15, 2023

Entangled ways of product development in the area of cybersecurity #3 - LogMan.io

At that time I lived in Prague for a short time, which is not a very friendly place to live, but it allowed me to go to the office almost every day. A bigger surprise awaited Vlaďka and Aleš when I told them that I was going to move to a house almost eighty kilometres from the office and that I would need to be mainly at the home office.

Continue reading ...

development tech premek

Published on January 15, 2023

Entangled ways of product development in the area of cybersecurity #2 - BitSwan

After successfully completing my engineering degree, I finally started working full-time at TeskaLabs just as I initially promised. In addition to data from the world of telecommunications, we started to learn data from the world of logistics in BitSwan, which of course required being able to calculate the cost of transporting some cargo from point A to point B.

Continue reading ...

development tech premek

Published on December 15, 2022

Entangled ways of product development in the area of cybersecurity #1 - Asynchronous or parallel?

I started working at TeskaLabs at the beginning of autumn 2017 as a student at the Faculty of Information Technology of CTU. In the job advertisement, I was particularly interested in the fact that it is a small, product-based company that does not focus on just one technology or one programming language.

Continue reading ...

development tech premek

Published on November 15, 2022

State machine miracle

How I learned what a finite state machine is and that good design is an essential part of programming.

Continue reading ...

development tech eliska

Published on October 15, 2022

Log Management: Pre-implementation analysis

Pre-implementation analysis is a preparatory phase on the way to deploying a functional cybersecurity management system, i.e. TeskaLabs SIEM and security event management, Log Management. It is an integral and essential part of the entire implementation process, as it helps uncover any potential risks that may arise when deploying the mentioned SIEM and log management tools.

Continue reading ...

logman tech

Published on September 15, 2022

SP-Lang: Category theory in the wild

We recently encountered several interesting problems that demonstrate how seemingly abstract category theory finds its practical applications and helps us solve these problems sustainably.

Continue reading ...

splang tech

Published on August 20, 2022

Passwordless login

It is necessary to maximize both security and user experience in the world of cyber security, IT and generally in the world of technologies. This requirement is closely connected to a so called *passwordless authentication* method which is an ideal balance between security and experience and is effective by limiting risk and creating user friendly environment.

Continue reading ...

auth passwordless

Published on July 15, 2022

Engaged with ASAB

About microservices, coroutines, failures and enthusiasm. And most of all, about ASAB. ASAB is the first thing that probably every newcomer to TeskaLabs gets fond of.

Continue reading ...

asab development tech eliska

Published on June 15, 2022

TeskaLabs LogMan.io: Microsoft Office 365 dashboards

Microsoft Office 365 is used daily by a large number of companies, businesses, and individuals. But only a few people know that Microsoft Office 365 provides very detailed data about who is working with them and how.

Continue reading ...

logman security

Published on May 15, 2022

How to enter the world of logs and cybersecurity.

What does it mean to log, create a corresponding dashboard and start writing JSON syntax? As I searched for answers to these questions and what were my first steps in tracing the world of cybersecurity.

Continue reading ...

security mitre

Published on March 15, 2022

Don't worry, ASAB and the universe can be fixed

How do my first sprints in TeskaLabs look like? Sheer desperation quickly turns into feelings of illumination and euphoria. And back. I've also made a few new friends and learned a thing or two about flushing metrics. The digital adventure begins.

Continue reading ...

asab development tech eliska

Published on February 15, 2022

TeskaLabs delivers C-ITS PKI for C-Roads in Greece

We are proud to announce that, TeskaLabs recently launched a cybersecurity solution – known as PKI – as a service for C-Roads pilot in Greece.

Continue reading ...

automotive press c-its v2x

Published on January 15, 2022

How big Log Management or SIEM solution does your organization need

Calculate size of IT infrastructure and how much EPS (Events Per Second) generates.

Continue reading ...

security

Published on December 15, 2021

And the winner is...Go!

What compiled language for a backend development is the right one to move our technological stack to the next level? We've started to look around for a compiled computer language that will enable us to build microservices with higher performance. Now, don't get me wrong, we don't depart from Python at all. It is the extension of the portfolio.

Continue reading ...

development tech

Published on November 15, 2021

Case Study - TeskaLabs SIEM for large Czech government organization

TeskaLabs delivered full-fledged SIEM solution for large Czech government organization with branches all over Czech Republic and need to process at least 20,000 EPS. The delivery was successfully completed on time and on budget.

Continue reading ...

security

Published on October 15, 2021

The 8th version of the European Certificate Trust List (ECTL) for C-ITS has been released

The Joint Research Centre of the European Commision (EC JRC) released the eight edition of the European Certificate Trust List (ECTL) used in Cooperative Intelligent Transport Systems (C-ITS). L0 ECTL v8 contains five new Root CA certificates and one re-keyed Root CA certificate. Three out of five newly inserted Root Certificates are installations that run on the TeskaLabs SeaCat PKI software for C-ITS.

Continue reading ...

press automotive c-its v2x security

Published on September 16, 2021

TeskaLabs delivers cybersecurity for nationwide C-ITS project in Czech Republic

TeskaLabs delivers Seacat PKI, public key infrastructure security technology, for newly emerging nationwide C-ITS project in Czech Republic.

Continue reading ...

press automotive c-its v2x security

Published on August 25, 2021

TeskaLabs SeaCat PKI for C-ITS delivered to CertiLab of Czech Technical University

TeskaLabs supplies the SeaCat PKI and the dedicated C-ITS security testing tool for CertiLab, laboratory for the development and testing of technologies for Cooperative Intelligent Transport Systems (C-ITS).

Continue reading ...

press automotive c-its v2x security

Published on July 07, 2021

TeskaLabs SeaCat PKI deployment for NordicWay C-ITS pilot in Norway

In many respects, today's motor vehicles function as connected devices. With this in consideration, joint EU initiatives have broadened the impact of Cooperative Intelligent Transport Systems (C-ITS) to include more expanded connections, including road infrastructure. This enhanced connectivity is expected to result in significant improvements to both road safety and traffic efficiency.

Continue reading ...

press automotive c-its v2x security

Published on June 15, 2021

C-ITS: The European Commission is updating the list of the Root Certificates

23rd April 2021 marks the release of the fifth edition of the European Certificate Trust List (ECTL). This was released by the Joint Research Centre of the European Commission (EC JRC), and is used in Cooperative Intelligent Transport Systems (C-ITS). It is otherwise known as the L0 edition release, intended for use primarily in test and pilot deployments. Currently these activities are primarily European and focus on fields such as intelligent cars and road infrastructure.

Continue reading ...

press automotive c-its v2x security

Published on May 06, 2021

TeskaLabs helps LINET with cyber security compliance for medical devices

LINET is a major European manufacturer of hospital and nursing beds. The company´s portfolio includes solutions designed for intensive care, products for regular in-bed treatment, and also special beds for retirement homes and long-term care facilities.

Continue reading ...

healthcare data-privacy

Published on October 16, 2020

TeskaLabs and University hospital in Pilsen launches a pilot of zScanner - open source mobile app for medical photo documentation

zScanner is a mobile application for clinical and medical photo documentation. zScanner enables doctors and nurses to take photos of patient medical records, and of injuries of the patients, and upload them to a hospital information system. zScanner is an application created by the Institute of Clinical and Experimental Medicine in Prague (IKEM), a major Czech hospital, and the largest center of clinical and experimental medicine in the Czech Republic. During the pilot in the University hospital in Pilsen, zScanner is used at a Clinic of Oncology and Radiotherapy, and at the Clinic of anesthesiology, resuscitation and intensive medicine.

Continue reading ...

healthcare data-privacy

Published on September 17, 2020

EV Charging Station security demonstrator

TeskaLabs is proud to announce the availability of EV Charging Station security demonstrator. This is a result of our research project. The Meili project was part of the UK Government and its partners Zenzic and InnovateUK £1.2 million programme to develop a cohesive understanding of the challenges and potential solutions to addressing digital resilience and cyber security within Connected and Automated Mobility.

Continue reading ...

automotive c-its v2x

Published on July 15, 2020

Five Ways AI And Machine Learning Can Enhance Cybersecurity Strategy

Artificial Intelligence (AI) and its essential component machine learning are causing a stir in practically every industry from marketing to education. It’s no wonder designers and tech developers are finding ways to use the benefits of automated technologies to improve cybersecurity infrastructure and defend against increasingly complex and numerous cyber threats.

Continue reading ...

security data-privacy

Published on June 24, 2020

C-ITS ITS-S Security microservice

As part of TeskaLabs‘s research activities, we are working toward a more flexible, contemporaneous method to deploy the software security component (specifically C-ITS Security) into the vehicle software ecosystem (ITS-S). The current best practice in the industry is that the cybersecurity component is integrated into the vehicle application software as a library. However, this approach brings with it many limitations, such as narrow software compatibility. The deployment is highly inflexible and so it is often omitted due to its complexity.

Continue reading ...

automotive c-its v2x

Published on June 15, 2020

C-ITS PKI as a Service

In many respects, todays’s motor vehicles function as connected devices. And with this in consideration, joint EU initiatives have broadened the impact of Cooperative Intelligent Transport Systéms (C-ITS) to include more expanded connections, including road infrastructure. This enhanced connectivity is expected to show significant improvements to road safety and traffic efficiency.

Continue reading ...

automotive c-its v2x

Published on May 14, 2020

TeskaLabs delivers cybersecurity for C-Roads pilot in Slovenia

We are proud to announce that in cooperation with DARS d.d., Motorway Company in the Republic of Slovenia, TeskaLabs recently launched a cyber security solution – known as PKI – as a service for C-ROADS pilot in Slovenia. This service is operated from a datacenter in Prague and includes Root Certificate Authority, Enrolment Authority and Authorization Authority.

Continue reading ...

automotive press c-its v2x

Published on April 14, 2020

Creative Dock, TeskaLabs, Indermedica, Czech Ministry of Industry and Trade and Line 1212 launch the indicative test for new COVID-19 coronavirus

🇨🇿 Uchránit přetížené zdravotníky před zbytečným náporem lidí i pomoci lidem, kteří mají obavy z nového typu koronaviru, ve správném vyhodnocení symptomů a dalším postupu má nový online ​Indikativní test Covid-19​, který vyvinuly české technologické firmy spolu s ministerstvem průmyslu a obchodu a linkou 1212.

Continue reading ...

healthcare data-privacy covid19

Published on March 29, 2020

Cyber-health with a password and an antivirus program is not enough

At the beginning of December 2019, the operating system of the Benešov Hospital was crippled by a malicious computer virus to such an extent that no device could be started and doctors had to cancel all planned operations.

Continue reading ...

healthcare data-privacy

Published on February 14, 2020

Crypta Labs, IDIADA UK and TeskaLabs won the CAV cyber security competition

Zenzic announces consortium of Crypta Labs, IDIADA UK and TeskaLabs as winners of share of £1.2 million award for self-driving vehicle cyber security feasibility studies. The competition is part of the government’s £100 million CAM Testbed UK Fund, supporting the Future of Mobility Grand Challenge.

Continue reading ...

press c-its v2x

Published on January 27, 2020

SeaCat PKI is now Generally Available

We are proud to announce the public launch of our latest product, the SeaCat PKI. SeaCat PKI is a state-of-the-art microservice that provides central cyber security certificate and key management for IoT, connected devices, and mobile applications.

Continue reading ...

press v2x

Published on January 15, 2020

TeskaLabs at the ETSI 1st C-V2X Plugtest

After a succesfull ETSI C-ITS Security plugtest at November 2019, TeskaLabs participated also at the ETSI 1st C-V2X Plugtest at DEKRA Testing & Certification Malaga Location, Spain, from 2nd to 6th December 2019. C-V2X is a new standard of how vehicles communicates among each other using a cellular network.

Continue reading ...

automotive c-its v2x

Published on December 15, 2019

TeskaLabs has become a leader of Mobile Healthcare applications in the Health (in) Future Platform

Cellphone instead of a filing cabinet. Until quite recently, doctors at the IKEM hospital in Prague needed to perform photo documentation by first taking pictures with a digital camera, and then downloading and/or uploading them via a computer network to patient cards. A solution to this tedious and time-consuming practice was made possible through the use of mobile scanning technology.

Continue reading ...

healthcare data-privacy

Published on December 10, 2019

TeskaLabs at the ETSI 7th CMS Plugtest validating C-ITS security

It is our great pleasure to announce that TeskaLabs successfully participated at the ETSI 7th CMS Plugtest at Sophia Antipolis, France, from 4th to 7th November 2019. This V2X plugtest was focused on testing C-ITS cyber security, interoperability and a validation of the European trust domain.

Continue reading ...

automotive c-its v2x

Published on November 15, 2019

Why Hackers Target Small Business Websites 5 Tips to Stop them

With the rise of online businesses, so does the hacking community. Many talented people with barbarous intentions from across the world develops systems with one intention in mind, to harm and attack websites and ruin the day for most entrepreneurs.

Continue reading ...

security

Published on October 15, 2019

How we work at TeskaLabs

How we work at TeskaLabs. We understand that our lives are finite so we focus on things that truly matters. We build the company that builds great products.

Continue reading ...

teskalabs agile

Published on September 15, 2019

TeskaLabs Achieves Globally Recognised ISO 9001:2015 Certification

The ISO 9001:2015 Quality Management System (QMS) certification which was achieved after an audit of TeskaLabs internal processes. TeskaLabs provides enterprise-grade cyber security and data privacy products for mobile and IoT applications.

Continue reading ...

press

Published on August 15, 2019

Making Automated Mobility Safe

Autonomous vehicles are still working their way into the modern automotive marketplace. However, they are growing more common each year. Many agree, this is an innovative change, and it’s estimated that there will be more autonomous vehicles on the road in the coming years.

Continue reading ...

automotive security v2x

Published on July 15, 2019

Connected Vehicles: Are we ready?

Connected vehicles that talk to each other, increase road safety, and rely on automation all seem like a plot from a sci-fi movie. When does the robot takeover come in? As outlandish as all of this might seem, we’re closer than ever to connected vehicles being the new normal on our roadways. In fact, by 2025, every car on the road is expected to be connected in some way, shape, or form.

Continue reading ...

automotive security v2x

Published on June 15, 2019

zScanner: mobile app for medical photo documentation with security by TeskaLabs

zScanner is a mobile application for clinical and medical photo documentation. zScanner enables doctors to take photos of patient medical records, and of injuries of the patients, and upload them to a hospital information system. zScanner is an application developed and used by IKEM, a major Czech hospital, and the largest center of clinical and experimental medicine in the Czech Republic.

Continue reading ...

healthcare data-privacy

Published on May 12, 2019

Asynchronous Server App Boilerplate Video Tutorial

Asynchronous Server App Boilerplate (or ASAB for short) is a microservice platform for Python 3.5+ and asyncio. The aim of ASAB is to minimize the amount of code that needs to be written when building a microservice or an aplication server.

Continue reading ...

tutorial development asab

Published on May 01, 2019

The Most Prevalent Wordpress Security Myths

WordPress web development may not seem like a challenging task. Since this platform has been in existence, a wide range of Web developers have handled projects of this nature. However, the top web development companies are not always aware of the issues and problems that take place when it comes to security.

Continue reading ...

security

Published on April 15, 2019

9 Usefull basics to deal with the cybersecurity

When it comes to dealing with the modern business, cyber security is more than an afterthought. Poor security standards will cost you more than just business, too; it could cost your reputation, or even your ability to trade.

Continue reading ...

security

Published on March 10, 2019

Future of the Automotive Mobility and Data Security

Mobility has always been at the cutting edge of human innovation and technological advancement. This is unlikely to change in the foreseeable future. Already, mobility as we know it is seeing significant disruption thanks to the entry of nontraditional players who are leveraging the power of computing devices and the Internet. But few things are likely to have a bigger impact on mobility than the enormous volumes of data that will be generated as a result.

Continue reading ...

automotive security v2x

Published on February 10, 2019

White box vs. Black box penetration testing

When it comes to hacking, there are many technical aspects that can be difficult to grasp without an extensive background in the field. One of the most common sources of confusion is the comparison between black box penetration testing and white box penetration testing.

Continue reading ...

security audit security

Published on January 15, 2019

IoT, AI and Cybersecurity Are Transforming Healthcare: Here's How

Technological advances are being made on a daily basis with one goal in mind - simplifying our daily lives. Everyone now owns a computer and smartphone and thanks to the Internet, everyone has access to lots of different types of information. The medical field has benefitted greatly from this advancement in technology. Not only does it help simplify many processes which would otherwise be long and tedious to complete, it also gives doctors and the medical personnel a powerful tool which allows them to do their jobs with more security.

Continue reading ...

medicat healthcare data-privacy iot

Published on December 13, 2018

9 Ways To Improve Cybersecurity In Healthcare

Modern healthcare is deeply intertwined with technology. From the sophisticated machines used for diagnosing disease to the enterprise systems that store patient records, it is extremely difficult to run any healthcare organization today without heavily relying on information technology.

Continue reading ...

medicat healthcare data-privacy

Published on November 10, 2018

TeskaLabs Ltd was Innovate UK Funding Competition Winner in 2018

While every company is drawn to answering big questions and making new discoveries, not everyone is excited about how to get there: securing money for growth. Even with billions spent on business research and development around the world, there is considerable competition for funds.

Continue reading ...

press security

Published on November 01, 2018

Developing a Mobile App in Healthcare

MediCat is one of TeskaLabs newest innovations and it centers around data protection and cybersecurity for the healthcare industry. In this article, we’ll explore the many use cases of MediCat.

Continue reading ...

medicat data-privacy healthcare

Published on October 15, 2018

Customer interview: Read how Prodvinalco uses TurboCat.io for a file encryption

Data encryption is a critical part of GDPR compliance although there are no explicit GDPR encryption requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.

Continue reading ...

gdpr data-privacy interview

Published on September 13, 2018

TeskaLabs delivers cybersecurity for C-Roads

TeskaLabs with a great pleasure announces that we succeeded in the public tender with our product SeaCat as a supplier of cybersecurity for a C-Roads platform in the Czech Republic.

Continue reading ...

automotive press v2x c-its

Published on August 21, 2018

Example of using BSPump with CSV files

Let us say we have a CSV file, no, wait, a lot of CSV files that are coming to our storage directory with flashing speed. We even do not have the slightest notion what names of the files are, the only thing we know is that we need to process their data and deliver them to our database as quickly as possible.

Continue reading ...

tutorial development asab

Published on August 19, 2018

Personal Data Deindetification: Pseudonymization

Pseudonymization is a critical part of GDPR compliance although there are no explicit GDPR pseudonymization requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.

Continue reading ...

gdpr data-privacy

Published on July 15, 2018

Building a private cloud on AMD Ryzen and Linux Containers

At our company, we develop our own software products that we offer to our clients and often also run ourselves. So far our company has operated its IT infrastructure — about 30 virtual servers—on a public cloud, specifically on MS Azure.

Continue reading ...

development tech

Published on July 01, 2018

Personal Data Deindetification: Homomorphic encryption

Homomorphic encryption is a special type of encryption invented by IBM. Encryption is a critical part of GDPR compliance although there are no explicit GDPR encryption requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.

Continue reading ...

gdpr data-privacy

Published on June 14, 2018

Personal Data Deindetification: Data masking (or suppression)

Data masking (or suppression) represents the de fact standard of pseudonymisation. Pseudonymisation is a critical part of GDPR compliance although there are no explicit GDPR pseudonymisation requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.

Continue reading ...

gdpr data-privacy

Published on June 11, 2018

Streaming Data from Various Sources

One of the main research and development topics nowadays is data processing and analysis, which can help companies discover relevant information about their customers or technologies using reports, visualizations, dashboards, and other business intelligence outputs.

Continue reading ...

tutorial development asab

Published on June 01, 2018

Personal Data Deindetification: Data Encryption

Data encryption is a critical part of GDPR compliance although there are no explicit GDPR encryption requirements. The regulation vaguely states that businesses must enforce safeguards and security measures to protect all consumer data that they handle. The GDPR refers to pseudonymization and encryption as “appropriate technical and organizational measures.

Continue reading ...

gdpr data-privacy

Published on May 16, 2018

Personal Data Deindetification: Anonymization

If you manage private data of any kind, you need to be familiar with the process of anonymization and how it can be used to keep the information you store safe from data breaches.

Continue reading ...

gdpr data-privacy

Published on April 16, 2018

TeskaLabs Annual Report 2017

TeskaLabs was very successful in 2017. Let’s start with numbers: TeskaLabs made a gross profit of $254,091 with before-tax earnings of $69,059. The company had positive cashflow in each month of the financial year 2017.

Continue reading ...

startup

Published on March 16, 2018

CatVision.io App available in Google Play

A few months ago we introduced CatVision.io SDK for Android, a developer kit which provides an easy and secure remote access to a screen of your mobile application. In January 2018 it was followed by CatVision.io SDK for iOS.

Continue reading ...

google play android app launch screen-share

Published on February 21, 2018

The Birth of Application Server Boilerplate

One of the most exciting tasks for our team in the last month was to create a new application server “boilerplate” that would be used as a basis for most of our growing data-processing products, as well as for other people and companies ...

Continue reading ...

tutorial development asab

Published on January 16, 2018

Pseudonymization, Anonymization, Encryption ... what is the difference?

The year 2018 will, at least in Europe, be a turning point for data privacy and personal information protection. In this article, I will focus on personal data processing. I describe methods of de-identification of personal data, such as pseudonymization, anonymization, and encryption.

Continue reading ...

gdpr data-privacy

Published on November 28, 2017

Google has introduced new rules about how mobile app developers and companies deal with customer impact on apps across the board. What is it?

The new regulations call for increased transparency with regards to how apps make use of customer data. Developers need to ensure that the way they handle user data - from how they collect it to what it might be used for - is perfectly clear to all users. In Google’s words, developers must “limit the use of the data to the description in the disclosure”. In layman’s terms, this means that data use and privacy policies need to be clearly visible on app descriptions in the Google Play store, and not simply within the app itself.

Continue reading ...

security mobile android

Published on October 10, 2017

Industrial IoT Security: Cyber Security Implications for IT-OT Convergence

In June 2017, two information security firms researching the 2016 hack of the electricity grid in Ukraine announced that they had identified the malicious code used to shut down power stations and leave thousands of households and businesses in darkness for several hours. The malware used to target the Kiev power grid has been named Industroyer, and it serves as a sobering reminder about the dangers faced by the Industrial Internet of Things (IIoT).

Continue reading ...

security iot

Published on September 05, 2017

How TeskaLabs Helped O2 Improve Customer Satisfaction of eKasa Point-of-Sale (POS), the Most Successful POS Product / Mobile Cash Register on the Czech Market

In 2016 the Czech government introduced a new law that required businesses to report their sales and provide Electronic Evidence of Sales (EET). This law calls for the adoption of a more modern point-of-sale system that enables businesses to meet regulatory requirements set forth under this law. During the next two years, the law will gradually impact more than three hundred thousand companies in the Czech Republic. O2, the largest integrated telecommunications provider in the Czech market, observed that many would need help complying with this law, maintaining data security and demanding excellent customer support.

Continue reading ...

security case-study pos

Published on August 08, 2017

How Productive Is a Company Retreat to Tenerife for Startups?

I would like to share with you an exciting experience that we at TeskaLabs recently had. I founded TeskaLabs three years ago, as a startup focusing on building communication and security technologies for connected products such as mobile applications and IoT devices. Over that time, my team and I have witnessed so much. We’ve been a part of the TechStars program in London and worked closely with eKasa, who have tested our business and technology to its limits.

Continue reading ...

startup

Published on July 22, 2017

Binary distributions of OpenSSL static libraries

The official source of OpenSSL software is the OpenSSL website. One can download OpenSSL source codes archives and compile them for a given platform. The compilation work can sometimes be quite tedious, especially for exotic platforms. We, at TeskaLabs, set up this page because we frequently compile OpenSSL for various platforms for our internal purposes and this may save some time to other developers.

Continue reading ...

development android windows ios security

Published on July 20, 2017

Online Fraud Is Increasing - Is Business Intelligence the Answer?

With the year on year rise in ecommerce, there is a corresponding rise in online fraud - in fact, according to Financial Fraud Action UK, this type of activity had increased by a quarter to £399.5 million in the first half of 2016. The most recent manifestation of this is the concept of “testing” - this is where the criminals try small purchases to check the validity of card details, before moving in for the kill.

Continue reading ...

security

Published on July 04, 2017

How TeskaLabs Helps You Operate SCADA Systems Securely and Comply with Security Laws

Cyberspace does not have boundaries. The internet is a truly international community, and it takes just milliseconds to reach a data source on a whole different continent. The internet is therefore an open arena for cyberattacks from across the world, where anyone can try to break their way into someone else’s data. We can see this daily in the news or on the specialized ICT news servers- the attacks never stop.

Continue reading ...

security iot

Published on June 06, 2017

5 Cyber Threats eCommerce Websites Should Watch Out For

There are innumerable advantages to eCommerce. Businesses can make sales outside of business hours; they can reach customers over their own personal social media pages, and take advantage of people being more inclined to spend while they’re on the couch with a glass of wine rather than harassed in the changing room of a crowded store. However, with all of these advantages, there are also some inherent threats that could annihilate a business’ reputation.

Continue reading ...

security

Published on May 02, 2017

Who is Responsible for Securing the Connected Car?

The automotive industry recently witnessed several cases of cyber-hacking that made driving connected cars dangerous if not impossible. Companies like Jeep, Volkswagen, and Tesla all have recently dealt with cases of hackers taking over cars and stopping them while the cars were in use as well as stealing customers' Social Security numbers, financial details, and other sensitive information.

Continue reading ...

automotive security v2x

Published on April 04, 2017

Why You Need Security Audit for Your Point-­of-­Sale (POS) System

It’s clear that POS systems are a source of important and valuable data, and have the power to either speed up the progress or to stop the development of a company, depending on whether or not they are used. POS data is a business asset. Despite this vital importance, such an asset is not afforded the protection it deserves.

Continue reading ...

mobile security pos

Published on March 07, 2017

TeskaLabs Advances to Preferred Solution Partner Within the Cisco Solution Partner Program

TeskaLabs announced that it is now a Preferred Solution Partner within the Cisco® Solution Partner Program. The Internet of Everything (IoE) continues to bring together people, processes, data and things to enhance the relevancy of network connections. As a member of the Cisco Solution Partner Program, TeskaLabs is able to quickly create and deploy solutions to enhance the capabilities, performance and management of the network to capture value in the IoE.

Continue reading ...

press

Published on March 01, 2017

How DDoS Attacks Can Sink Your Business

Distributed Denial of Service (DDoS) is a form of cyberattack which makes the target internet service inaccessible. “Distributed” refers to the fact that the attack comes from multiple sources, to have a bigger impact on the target, as it cannot cope with such a large amount of traffic. In recent years, DDoS attacks have become more and more complex, with many combinations of different attach approaches being used.

Continue reading ...

security

Published on February 07, 2017

Building High-Performance Application Servers - What You Need to Know

Using scalable and reliable software is vital for the success of any large-scale IT project. As increasing numbers of transactions are made, application infrastructure needs to stand strong and support that growth, and not be another source of problems.

Continue reading ...

development tech

Published on January 17, 2017

4 Common Mobile Point of Sale (POS) Security Issues Affecting Retailers That POS Providers Need to Act On

As mobile point-of-sale applications and systems are picking up speed at retailers around the world replacing traditional one, they become appealing targets for cybercriminals allured by the amount of consumer data entered in POS systems whether through unauthorized access, mobile malware or hacking the backend.

Continue reading ...

security mobile pos

Published on January 03, 2017

A Year in Review: The A to Z of TeskaLabs in 2016

As we approach the end of the year, we thought it would be fitting to look back and highlight the moments, people, and things that mattered most to us. Here is the A to Z of TeskaLab in 2016.

Continue reading ...

kitchen-news startup

Published on December 23, 2016

SeaCat and OpenSSL Heartbleed Bug

After almost two and a half year we hope that the Heartbleed remains in the past. It is not true, unfortunately. Now we have proof that a security vulnerability remains with us for a long time, maybe almost forever even when there exist patches and fixes. The Internet is a battlefield among the good, the bad, and the ugly. Who has better attacking or defending technology wins.

Continue reading ...

security

Published on December 20, 2016

The Real Impacts of General Data Protection Regulation (GDPR) to EU Companies That Operate Mobile Applications

The General Data Protection Regulation (GDPR) is a new EU regulation aimed at protecting the personal data of EU citizens. Because of the broad definition of “personal data”, GDRP impacts almost every EU company, as well as non-EU companies that exchange data with them. The regulation takes effect in May 2018, which is still a long way in the future, but the complex requirements mean that companies need to start planning and taking action now.

Continue reading ...

security

Published on December 06, 2016

Key Areas and Best Practices to Focus for Mobile API Security

With APIs (Application Programming Interfaces) becoming a crucial factor in any web or mobile application, security feels more like a journey than a destination. Of all the constituents that encompass an application, API gateway offers easy access points for a hacker to break in and steal your data. A single error in API can cause immense problems for any organization using your API.

Continue reading ...

security mobile development

Published on November 22, 2016

Android Nougat: Google OS' Tightest Security Yet

Officially released a month ago, the latest Google mobile OS version has made a few major adjustments, particularly in its security features. The search giant has improved the security in the Android Nougat (or also known as Android N) from strengthening the Android itself to some tools that helps developers to keep things as it is while users install apps.

Continue reading ...

security android

Published on November 15, 2016

TeskaLabs Joins the Cisco Solution Partner Program

TeskaLabs announced that it has joined the Cisco® Solution Partner Program as a Solution Partner. The Internet of Everything (IoE) continues to bring together people, processes, data and things to enhance the relevancy of network connections. As a member of the Cisco Solution Partner Program, TeskaLabs is able to quickly create and deploy solutions to enhance the capabilities, performance and management of the network to capture value in the IoE.

Continue reading ...

press

Published on November 09, 2016

5 Things You Need To Know About Securing Your Game App

The game industry is constantly evolving and growing on a rapid scale by each passing day. A significant part of this industry is mobile gaming. With huge advancements in mobile device technologies, gaming apps are on a high demand and so is their supply. One of the major reason behind this are the developers who are splurging millions of dollars in their time to market strategies. In all of this, the security of gaming apps takes a backseat, overlooked by developers in a haste a to launch their product before their respective competitors.

Continue reading ...

mobile security

Published on November 08, 2016

TeskaLabs is among UK’s Top 1% Rated Startups by Early Metrics

TeskaLabs, a London and Prague-based early-stage cybersecurity company, has been awarded a score of 84 out of 100 by Early Metrics, a rating agency which specializes in startups and SMEs. This places TeskaLabs in the top 1% of startups rated by Early Metrics, joining the exclusive club of five-star startups.

Continue reading ...

press

Published on October 26, 2016

Want to Be a “Man in the Middle” of a Mobile Communication? It’s Easier Than You Think

Mobile are everywhere nowadays and a central part of almost everyone's lives. In fact, we are using them for everything - both for personal and business purposes. From streaming media entertains us on our way to work, to chatting with friends and family, to sending emails at work - mobiles are now effectively computers on the go. According to a study from Cisco, we are using mobile access more and more. And this trend will continue well into the future.

Continue reading ...

mobile security

Published on October 25, 2016

80% of Androids Are Vulnerable to Linux TCP Flaw. But I Don’t Care!

Researchers from the University of California, Riverside, and the U.S. Army Research Laboratory have found an off-path TCP vulnerability [1] that affects more than 80% of Android mobile devices. Unlike a Man-in-The-Middle attack, you don't need to be in the middle of the communication to get hacked - all attackers need to know is who you communicate with.

Continue reading ...

android security

Published on October 11, 2016

What Is Mobile Application Containerization or Wrapper, and Why It Needs to Go?

Containerization is an alternative for full machine virtualization. You probably know well-known containerization technology from Docker or Rocket. However, this article addresses the pros and cons of mobile “containerization” or wrapper used to isolate the mobile app from the mobile operating system or other applications installed on the same device. These type of “containerization” work in a different way.

Continue reading ...

tech security

Published on September 27, 2016

Is There A Network Protocol for Your Mobile Apps That Offers A Higher Security Level While Consuming Less Bandwidth Than HTTPS? Yes, There Is

For mobile apps or websites that don’t have logins, forms or features to extract data, you don’t need secure access. For banking websites, mobile apps and mobile banking services, without a doubt, secure communication is a must. But nothing is ever black and white.

Continue reading ...

tech security

Published on September 13, 2016

How to Teach Your Kids to Safely Play Pokemon GO

This summer something strange has occurred in my household. Suddenly, all of my children ranging in age from 9 to 18 are willingly piling into our van the minute I mention driving anywhere- even to the grocery store. And it’s not my company or the possibility of picking out this week’s cereal they are seeking. No, they are merely wanting a ride to aid them on their hunt for elusive Pokémon.

Continue reading ...

security mobile musing

Published on August 30, 2016

Interview with Alex Goryachev, the Mastermind behind Cisco’s Grandest Innovation Challenge

We spoke to Alex Goryachev about the recent Innovate Everywhere Challenge, an initiative from Cisco to empower employees to think and act like passionate entrepreneurs with greater agility, speed, and risk-taking.

Continue reading ...

interview innovation

Published on August 16, 2016

Custom Made vs. Off-The-Shelf Mobile Apps – The Issue of Security

In October 2015, Blakely Thomas-Aguilar did a great article on mobile security statistics on the VMware AirWatch blog that can and will send shivers down your spine. For example, she found that there was an increase of 18% in the number of Android vulnerabilities between 2011 and 2015.

Continue reading ...

mobile security

Published on July 26, 2016

Are You Ready for The New European General Data Protection (GDPR) Law?

A new EU regulation, European General Data Protection Regulation (GDPR) has been proposed to improve the data protection of individuals. This regulation is the subsequent to the 1995 directive. It was agreed on 17 December 2015 and its implementation starts from 2018.

Continue reading ...

security

Published on July 12, 2016

You Can Build Apps for the Apple TV, But Do You Know How to Do It Securely?

Apple will want to dominate the market for TV apps. To achieve this objective, it’s understandable that Apple makes it easy for app developers to create apps and games for the Apple TV platform using tvOS and profit from them just as they have already done so for the iPhone and iPad devices. Developers can leverage similar frameworks and technologies since tvOS is just a modified version of the iOS. They can even retrofit the apps that were previously developed for iOS to support the Apple TV’s tvOS.

Continue reading ...

mobile security

Published on June 29, 2016

The Outrageous Cost of HTTPS - Why?

Mobile applications use HTTP communication between the application backend and the clients. Because of the demand for higher level of security, IT people implement HTTPS by setting up certificates issued by LetsEncrypt Certification Authority in their application backend server. The shift between non secure HTTP connections to HTTPS connections leads to a significant increase of amount of data being transferred from/to the clients. How is this possible?

Continue reading ...

tech

Published on June 14, 2016

How Azure Helps Our Startup - The Perk of Being a Microsoft Bizspark Plus Member

Azure is not only for the big boys. Startups also need to get their core business off the ground and deploy intelligent solutions with little investment in the IT infrastructure. They need to deliver products to their customers as quick as possible, and they need Azure for this even more than the big companies do.

Continue reading ...

community startups

Published on May 24, 2016

We Know Why 85% of Mobile Apps Suck in Security. Do You?

In just the past 12 months, we’ve come across 100 mobile app projects at different phases. We’ve had conversations with more than 300 professionals active in the enterprise mobility space. We asked questions and uncovered the underlying problem that caused the current miserable state of mobile application security. It sucks. The answer doesn’t lie in technology but in us.

Continue reading ...

mobile security

Published on May 19, 2016

Juggling A Corporate Job and A Side Business - Part 2

An interview with Mia Bennett, Head of Alliances and Special Projects, PwC, is a part of a series of interviews on enterprise innovation with corporate intrapreneurs, technology enthusiasts and visionaries within some of the world's largest companies.

Continue reading ...

interview innovation

Published on May 17, 2016

Security Is Driving the Adoption of Connected Cars

What seems to be a Sci-Fi movie with “talking” vehicles and “flying” machines has now become a reality. Automotive companies, seeing huge opportunity and wanting to entice their customers, are rushing to produce more car features so drivers can avoid traffic congestion, plan the next route, check the status of the car, find an available parking space, request for road assistance, or notify friends/family members/business contacts of news.

Continue reading ...

automotive security v2x

Published on May 10, 2016

Why Is Data Encryption Necessary even in Private Networks?

Securing data transferred between different endpoints is important not only through public networks but also in private networks. The data has to be protected if it is business critical or if modification or interception leads to a security incident with a high business impact.

Continue reading ...

security

Published on May 03, 2016

TeskaLabs Join IDEALondon Innovation Center

TeskaLabs, a London and Prague based security startup, announced today that it has joined the IDEALondon program. The program, powered by Cisco, DJ Thomson and University College of London, will position TeskaLabs among the hottest startups in Europe’s biggest technology hub.

Continue reading ...

press

Published on May 02, 2016

Create Unexpected Value to PwC and Expected Value to Startups - Part 1

An interview with Mia Bennett, Head of Alliances and Special Projects, PwC, is a part of a series of interviews on enterprise innovation with corporate intrapreneurs, technology enthusiasts and visionaries within some of the world's largest companies.

Continue reading ...

interview innovation

Published on April 25, 2016

OpenSSL DROWN Vulnerability Affects Millions of HTTPS Websites and Software Supporting SSLv2 (CVE-2016-0800)

DROWN is caused by legacy OpenSSL SSLv2 protocol, known to have many deficiencies. Security experts have recommended to turn it off, but apparently many servers still support it because disabling SSLv2 requires non-default reconfiguration of the SSL cryptographic settings which is not easy for common IT people who have limited security knowledge and don’t know the location to disable this protocol and the way to disable it.

Continue reading ...

security bulletin blog

Published on April 12, 2016

Better Late Than Never - WhatsApp Is Using End-to-End Encryption – Finally!

Can you imagine leaving your house without locking the main door while you are out? I guess not. Locking the door is a routine that we're doing automatically, so why there is so much noise about the latest update from WhatsApp that seems like the company has just reinvented communication encryption?

Continue reading ...

security

Published on April 07, 2016

IoT Tech Expo Europe - A Spectacular Learning Experience

The expo witnessed a high-caliber team. There were more than a hundred companies along with many speakers and attendants who came from all over the UK, Europe and even the United States to attend this expo and make it a success. The attendees got detailed info about the entire IoT / M2M industry.

Continue reading ...

events

Published on March 29, 2016

Integrate Charles Debugging Proxy With SeaCat Gateway

Developers of web applications often take advantage of using HTTP proxies to debug their applications. It allows them to check headers and body of outgoing requests and incomming responses and track possible flaws of their client application and server backend. You want to be able to do the same with mobile applications secured with SeaCat. Here is how you do it by integrating Charles Web Debugging into the process very easily.

Continue reading ...

tutorial

Published on March 17, 2016

TeskaLabs and Chelsea Apps Factory Announce Strategic Partnership to Accelerate Secure Enterprise Mobility

TeskaLabs have announced a partnership with Chelsea Apps Factory (CAF), a company specialising in the development of mobile apps and UK’s fastest growing mobile organisation. The partnership will enable both companies to deliver value in the growing enterprise mobility market.

Continue reading ...

press

Published on March 09, 2016

What Does This Millennial Think About Innovation: An Interview with Matthew Bingley, Client Innovation Executive of Atos

Some people seem to be of the opinion that technological innovation has been largely iterative over the past 30 years and whilst we have achieve a great amount in terms of improving quality of life, there hasn’t been any real ‘ground shaking’ innovation. I suppose these same people are arguing that the internet is an iteration on interaction and isn’t particularly revolutionary.

Continue reading ...

interview innovation

Published on March 08, 2016

Application Security Issues for HTML5-based Mobile Apps

HTML is no longer restricted to just websites. With its latest edition, HTML5, the markup language family has now become a popular choice for mobile applications. After gathering the relevant data and researching, Gartner predicted two things; firstly, HTML5 would be the most commonly used language for mobile applications in 2015 and secondly, HTML5-based hybrid mobile app using technologies such as PhoneGap, Codova or React Native reach up to be 50% of all mobile apps 2016.

Continue reading ...

mobile security

Published on March 01, 2016

TeskaLabs’ Technology SeaCat Unaffected by GNU C Library Security Vulnerability (CVE-2015-7547)

TeskaLabs, a Prague and London based startup in application security, today affirmed that their core products are not exposed to the GLibC flaw, a highly critical security vulnerability. There is now a rapidly growing number of IoT devices that use Linux as their operating system and inherently GLibC.

Continue reading ...

press bulletin blog

Published on February 17, 2016

Should I Use Contactless (NFC) Payment Cards?

Nowadays, almost all smartphones contain NFC (Near field communication) technology. Contactless cards use this technology when they communicate with contactless payment terminals to exchange needed information and proceed with the transaction. However, you can also do this by using your smartphone.

Continue reading ...

mobile

Published on February 16, 2016

TeskaLabs Welcomes New VP of Application Security

TeskaLabs today welcomed ICT security expert Jiri Kohout as their new VP of Application Security. Kohout will have oversight of the information security landscape, architecture design and security implementation, assisting organizations and TeskaLabs Partners to build and operate mobile solutions securely according to best practices and standards.

Continue reading ...

press

Published on February 11, 2016

7 Reasons Why Mobile App Security Testing Is Crucial for Enterprises

Gartner reports that by the end of 2015, 75% of mobile apps will fail basic security tests. Over 2/3 of large enterprises have been breached via mobile applications. Each security breach up costs up to $3 million/year. The estimated annual cost of mobile cyber breaches is around $50 billion, globally and increasing.

Continue reading ...

mobile security

Published on January 12, 2016

The Security Vulnerability That Puts Millions of Application Backends at Risk. Yours Included

FoxGlove Security researchers published a serious vulnerability that can put millions of application backend, including mobile backend, at risk. Mobile applications use the same web-app technology for their backends, thus suffer the same vulnerability. Mobile application servers are inherently insecure because they consist of extensive stacks of software. Each piece can contain risky zero-day vulnerabilities.

Continue reading ...

mobile security

Published on December 15, 2015

Czech Startup TeskaLabs Wins Global Entrepreneurship Week

TeskaLabs, a startup focused on security for mobile applications and Internet of Things, captured first prize at the 2015 Global Entrepreneurship Week (GEW) Pitch Day Start It Up! event last week. The company was recently the first Czech startup ever to attend TechStars London, a world leading accelerator. TeskaLabs launched in early 2015, through StartupYard, a leading Central European seed accelerator, in Prague.

Continue reading ...

press

Published on November 26, 2015

The Two Real Challenges of the Internet of Things

Every week there is a new connected device on the market. A few days ago Tag Heuer launched its smartwatch with Google, and last week I saw a €39 sleep tracker in my supermarket plaster section. Tech conferences are buzzing about the Internet of Things (Consumer Electronics Show 2015, Pioneers Festival 2015).

Continue reading ...

IoT security

Published on November 24, 2015

The TalkTalk Hack: What You Need to Know

TalkTalk, one of the largest providers of broadband and phone service in the UK, has recently admitted to being the victim of a large cyberattack. For those in the United States or in another country where TalkTalk’s influence isn’t as widespread, it could be considered on the same level as a Verizon or an AT&T data breach.

Continue reading ...

security

Published on November 10, 2015

The Top 5 Mobile Application Security Issues You Need to Address When Developing Mobile Applications

Most recently, a lot of established companies like Snapchat, Starbucks, Target, Home Depot, etc. have been through a PR disaster. Do you know why? Simply because some attackers out there found flaws in their mobile apps and could exploit them. In fact, by the end of this year, 75% of mobile apps will fail basic security tests.

Continue reading ...

mobile security

Published on November 03, 2015

Understanding the Importance and Value of Backend Security

We know that backend security is important, but what exactly constitutes the “backend?” To put it simply, the backend is the portion of a website, web application, or mobile application that exists behind the scenes. By contrast, the “frontend” of an application is everything that the user interacts with. This includes design features in the website or application, links, transactions, images, content, and others.

Continue reading ...

mobile security

Published on October 06, 2015

Develop Enterprise Mobile Apps? Turn Application Security into Profit instead of Cost

More than 3/4 of enterprises have experienced mobile security breaches. These breaches cost larger enterprises approximately 3 million dollars. One reason is the build cost to properly implement mobile application security measures.

Continue reading ...

mobile security

Published on September 29, 2015

iBeacons & Mobile App - The Art of Attracting More Visitors to Museum and Art Galleries

Many museums and galleries are trying to find out ways to attract more visitors. It is obvious that institutes with better and more valuable items will attract a larger audience. However, what would you suggest the smaller museums and galleries do?

Continue reading ...

mobile

Published on September 22, 2015

Security Architect Jiri Kohout: It's up to Us to Define How Secure The Internet Will Be

The security of connected applications, IoT, or mobile platforms, is based not only on secure development, but also on widespread knowledge about info security. Every user should have minimum knowledge about security. Every public tender should demand security of the final product or service.

Continue reading ...

interview security

Published on September 15, 2015

5 Things to Look for in an Enterprise Mobile Development Platform Solution

Today many enteprises are looking to have their own mobile applications. With the right solution, you can build a mobile app that will fit your organization’s needs like a glove and be in the driver’s seat of the development.

Continue reading ...

mobile development

Published on September 01, 2015

Now This Is Banking at Your Fingertips

How do you currently withdraw your money from an ATM? Is there any other way, you might wonder? Some banks, like Airbank in the Czech Republic and Tatra Bank in Slovakia, are offering a new way to withdraw your money.

Continue reading ...

innovation banking industry

Published on August 25, 2015

Security Researcher Filip Chytry: Online Security Is an Unattractive Topic - until People Get Hacked

I studied at Applied Cybernetics school and worked on various fields: robotics, networks and programming. There I got curious about security and became increasingly passionate about the industry, trying to learn more about cyber crime and attempting to hack into my classmates‘ computers for fun.

Continue reading ...

interview security

Published on August 20, 2015

TeskaLabs Secures €337 K in Pre-Seed Funding

TeskaLabs, a hi-tech security startup founded in Prague, with operations in London, announced today, exclusively through Forbes.cz, that it has secured €337,000 (CZK 9.1 million) in a pre-seed funding round, from a mix of private and institutional investors. TeskaLabs, which produces cutting edge enterprise-grade security for mobile and Internet of Things (IoT) applications, is backed by noted tech accelerators StartupYard Prague and Techstars London, and Credo Ventures, a European venture capital firm.

Continue reading ...

press

Published on August 19, 2015

Hacking Team Getting Hacked - In Whom We “Trust”?

The hack on the Italian-based firm Hacking Team revealed that exploiting is not just done by black hats and bad hackers but can be committed by a legitimate company. A dump of 400 gigabits email revealed that the company was involved in zero-day exploits.

Continue reading ...

security

Published on August 04, 2015

What Happens When Hackers Hijack Your Car ... While You’re in It

What do Chrysler Jeeps, GM cars, and Tesla Model S have in common? They are now becoming giant smartphones traveling on a highway. They all have serious security vulnerabilities and can be hacked!

Continue reading ...

IoT security

Published on August 04, 2015

Apple's Zero-Day Security Flaws on iOS, OS X Let Hackers Steal User Passwords

To show Apple a flaw in their environment, a team of University researchers created a malware app and uploaded it to the App Store. This malware can steal passwords from installed apps, email clients, and Google's Chrome web browser. By exploiting this flaw, hackers can bypass the App Store security check using this hacking app.

Continue reading ...

mobile security iOS

Published on July 28, 2015

Connecting the Unconnected. Securing the Internet of Things (IoT)

The Internet of Things (IoT) has unleashed new trends, and things are now labeled Smart-X (X = things). We can now connect the unconnected like cow or Barbie doll. But anything that can be connected can be hacked.

Continue reading ...

IoT security

Published on July 14, 2015

Snap to It: Mobile Secure Gateway Is In Your Future

The enterprise world is changing. In the past, enterprises built their IT infrastructure as isolated data fortresses and did everything they could to prevent outsiders from accessing their data. But now they need to open that fortress to allow communication via mobile technologies. And this hole is where hackers strike.

Continue reading ...

musing security

Published on July 07, 2015

Who Benefits from Business Intelligence Mobile?

Businesses are now open to the idea of adopting BI in their mobile apps to reap the benefit from accessing real-time (or near real-time) visual representation of data and make better and faster business decisions. This article focuses on the five groups of professionals who benefit from Mobile BI: marketers, salespeople, field workers, operation managers, and executives.

Continue reading ...

mobile business-intelligence

Published on June 30, 2015

5 Reasons Why Security Matters When You Want to Go Mobile

Security is an essential part of today’s modern world, especially with the rise of computers and mobile devices. No one questions whether data centers, servers, and computers should be secure, so why are there so many questions about mobile security? Mobile devices face the same security threats and are, sometimes more susceptible to them. It is time to make mobile security a priority.

Continue reading ...

mobile security

Published on June 23, 2015

Developers and Industry - The Two Worlds That Should Get Acquainted

Today the mobile application development business is booming. Mobile is the new cool, and every other kid knows, or wants to know, how to develop a mobile app. With the rate we're achieving now, we will soon have an app for nearly every situation in our life.

Continue reading ...

mobile, musing

Published on June 16, 2015

Look Who's Talking! Privacy and Security Concerns Over The New Hi-tech Barbie

Our Business Development Manager, Pavel Enderle, had an interview with CT24 TV, a Czech television channel, to discuss cloud security regarding the new Barbie product, Hello Barbie. This Barbie can talk to children by using ToyTalk’s system to analyze the child’s speech and produce relevant responses.

Continue reading ...

security IoT

Published on June 09, 2015

A Musing on the Deutsche Telekom Data Leakage

As the scandal of Deutsche Telekom hit the airways, some Europeans think this type of spying only happens in the United States. However, the bad news is it happens in every country in the world. Corporations have started to spy on their customers, staff, and common people like you and me.

Continue reading ...

security, musing

Published on June 04, 2015

Security Issues in Nissan’s Mobile App, NissanConnect, Could Potentially Put Users’ Data at Risk

As technology continues to advance, cars are increasingly becoming integrated into our mobile devices. Automotive brands are now releasing mobile apps, allowing users to connect their music streaming services, social networks, and search engines into the car’s system. One app that I’d like to highlight is NissanConnect, a mobile application from Nissan.

Continue reading ...

security audit

Published on May 28, 2015

MazelTov and the Russian Underground Have It Going for Your Android Devices. But Not for Good Reasons

The Internet has been a good place for individuals and businesses. However, it's fast-becoming a leading medium for criminals in this cyber war against people like you and I. One example is the Russian underground that sell anything to do with cyber crime. On their websites, you can find any type of Trojans, exploits, rootkits and fake documents.

Continue reading ...

security

Published on May 19, 2015

A Warning about Zero-Day Vulnerability

A zero-day, also called zero-hour, vulnerability is a security flaw in the code that cyber criminal can use to access your network. Zero-day attacks call for new technologies built from the ground up for today’s advanced threat landscape. There is no known fix, and by the time hackers attack, the damage is already done

Continue reading ...

security

Published on May 12, 2015

Q&A: Mobile App Developers Asked How SeaCat Will Protect Their Apps, Backend, and the Data. Here Are the Answers

We've spent a great deal of time talking to mobile app developers to understand their approach to handling mobile application security. In this Q&A, we put together the answers to the most common questions asked by these app developers.

Continue reading ...

tech

Published on May 07, 2015

Develop Secured Mobile Applications for Everything Going In & Out

Without a doubt, one of the biggest changes we are witnessing within the IT industry is that it has officially went mainstream. Whereas in the late 1990s and early 2000s, the idea of technology being so commonly and openly usable was simply a pipe dream, today just about anyone can jump onto a mobile application and get everything they need with a simple to use interface, and quick response to their queries and questions.

Continue reading ...

mobile

Published on April 28, 2015

How to Win in the Enterprise Mobility Market

At the Dublin Web Summit, I had many interesting chats with people who developed mobile apps for enterprises and large companies. Despite their differences, most had the same mindset regarding the security of their mobile apps and the backends. 'It's as secure as the infrastructure at our customers.' Is it? Let's find out.

Continue reading ...

mobile security

Published on April 21, 2015

Why Developers Are Boosting Up Their Mobile Application Security?

Mobile application security is a significant issue for developers. Most try their best to make mobile apps secure and safe for their users. Here are some of the other reasons why developers are boosting up their mobile application security.

Continue reading ...

security development

Published on April 14, 2015

SeaCat Starter Pack for iOS

Starter pack is SeaCat distribution package that is prepared to enable quick evaluation and understanding how SeaCat product works. Also it is a boilerplate for new mobile applications that are equipped with SeaCat.

Continue reading ...

tech ios osx

Published on April 02, 2015

Situations Where Mobile App Security Best Practices is Necessary

The use of mobile app security best practices has become a necessity as app development and mobile usage continue to grow. These practices are needed to improve consumer protection, trust, and regulatory compliance.

Continue reading ...

security development

Published on March 24, 2015

SQL Injection - Are Developers to Blame for Data Security Breaches?

Of course, this is a bold statement, but for those who deal with security issues from mobile applications, they can pinpoint where the flaw occurred with developers not taking security into account when developing mobile apps. Security takes the back seat to app functionality and remains as second thought.

Continue reading ...

security development

Published on March 07, 2015

The Golden Age of Black Hats

I experienced a precious moment, discovering the cause which contributed to today's dire state of mobile application security. App developers think that if their apps do not deal with money, they should not have to care about app security. Is it true?

Continue reading ...

security development

Published on February 24, 2015

What's More Important For Mobile App Developers: Prioritizing Privacy, Security or Ease of Use?

The industry of mobile app development is rising quicker than the speed of light. However, the apps seem to have problems with security and privacy even though they are easy to use. Mobile apps are developed in a few months without regards to security, privacy, or the fact they can easily be breached by hackers. Some companies have known for months about a security issue, but don't do anything until there is a breach.

Continue reading ...

development

Published on February 17, 2015

What Can We Do as Mobile App Developers in This BYOD Era?

Today we live in a mobile environment. There are more mobile devices connected to the Internet than human beings in the world. This has given us more freedom to choose to work from anywhere, anytime and given us the flexibility to take care of other important matters.

Continue reading ...

musing byod mobile

Published on February 03, 2015

SeaCat Tutorial - Chapter 5: Using Parse.com with REST Integration (iOS)

As the market with Cloud Computing and Mobile devices is getting bigger, there is another specific option available. It's called (Mobile)Backend-As-A-Service (BAAS) and it is extremely useful in situations we want to subscribe a complex backend service (alongside the core backend solution, there is usually a lot of additional functionality and statistics) and primary focus on development of client part of mobile apps for instance.

Continue reading ...

tech tutorial ios osx

Published on January 31, 2015

Distributed-Denial-of-Service (DDoS) Disrupted Gaming Industry During the Holiday - What You Need to Know

During the Christmas holiday, the Xbox and PlayStation networks at Sony and Microsoft game websites were taken down by a group of hackers called Lizard squad. This attack put thousands of users out of game playing. What a bummer huh? Originally, the FBI blamed the North Koreans for taking down the network--that is another story, but had since revised their assessment when the Lizard squad claimed responsibility for the attack.

Continue reading ...

security

Published on January 27, 2015

Android: The One That Gets The All the Attention - Developers, Hackers and YOU

Android is considered one of the best operating systems used in smart phones. This operating system is backed by Google, the number one search engine. The Google Play has become an obsession now, enjoying the biggest number of smart phone apps. Many of them are absolutely free. But what if we tell you that Android is the easiest operating system to hack and even customized apps such as Gmail can be hacked. Recently it was checked and confirmed that Gmail is one of the top endangered apps, which can be hacked very easily.

Continue reading ...

android security

Published on January 20, 2015

The World of Mobile Apps Is Not As Secure As You Think

Mobile app startup companies are notorious for cutting corners. One of the first things that is cut is security. After all, they have the big guys like Comcast, AT&T, and Verizon to protect mobile users, right? Wrong! All the way down the line. TechCrunch's article about security for mobile devices is an interesting theory on the state of security on the Internet. Although, they do hit the mark in the article about how companies fix the problem after the fact of the security breach.

Continue reading ...

startup security

Published on January 13, 2015

Having Fun with Your Android Apps? So Do Cyber Criminals

You love your Android phone and you love to go to the Play Store and download exciting new apps. You have also been through the Crazy Birds obsession and the Candi Crush mania. But do you know that your Android phone is not secured against the smartest of breaches: mobile app hackers. Before we go ahead and explain the intensity of this threat to mobile apps, especially Android apps, let’s have a look at the facts and figures!

Continue reading ...

android security

Published on January 05, 2015

TeskaLabs' Security for Android Apps to Be Launched Soon!

TeskaLabs, a European startup that specializes in providing innovative software to secure mobile applications and accelerating mobility adoption, is finalizing plans to release new SeaCat Mobile Secure Gateway version for Android app, designed to enable developers to build security directly into their Android mobile application with powerful, yet easy-to-use “snappy” mobile security tool.

Continue reading ...

press

Published on January 05, 2015

Business Intelligence and Mobile App Security

We are a security Cat, specializing in mobile application security. You know that. In the last couple of months, we happened to stumble onto another tech domain: Business Intelligence (BI).

Continue reading ...

business-intelligence security

Published on December 26, 2014

[Video] Oracle BI Mobile App Present for Christmas

Let us share with you an update from the SeaCat kitchen. We have officially completed the integration and implementation of securing Oracle BI Mobile Solution by Christmas. Enjoy our mini video.

Continue reading ...

business-intelligence kitchen-news

Published on December 23, 2014

SeaCat's Awesome Pack for Startups

Hello Startups! The thing is that,like us, you are participating in one of the most dynamic growing fields right now. You’re ready to build mobile applications for hundreds and thousands of users, extends the business capabilities to your clients and business partners, creating more business opportunities for them and for yourselves. But delivering an app, even if it is top-notch, state-of-the-art with full business features,is simply not enough. Your app will become untrustworthy the instant it is compromised by the ever-growing security threats and attacks.

Continue reading ...

startups promo

Published on December 20, 2014

Save the Day and Do the Impossible - Business Intelligence Community Stays Tuned

Let us share with you fresh news from the SeaCat kitchen. A few weeks ago we had a workshop with one potential customer who was currently working on a mobile application which should access Oracle Business Intelligence (BI) suite, basically Oracle Business Intelligence Mobile HD based solution. We piloted Oracle BI SDK & SeaCat integration.

Continue reading ...

tech video kitchen-news BI

Published on November 30, 2014

What’s The Difference Between Seacat and VPN?

One of the most common questions people asked us is if SeaCat some kind of a VPN? It's not. Virtual Private Network (VPN) extends a private network across a public network, providing secure connectivity from/to a mobile device. Every application on this device, thus now has access to the private network through the channel opened by VPN. This is safe up to a certain level because it is almost impossible to ensure the integrity of every application on the devices. Especially now when there are apps for everything, and users can download them from Google Play and the Apple store.

Continue reading ...

tech

Published on November 25, 2014

SeaCat Tutorial - Chapter 4: Using MongoDB with REST Integration (iOS)

The previous tutorial introduces several concepts and helps you understand the basic of REST API integration with iOS client written in Swift. There are several limitations, with data storage being the most important. This article provides instructions on how to work around this restriction.

Continue reading ...

tech tutorial ios osx

Published on November 25, 2014

Cat Does School. Oldest Private University in Czech Republic Gets Cat in the Classroom. How So?

We are very happy to be part of the classroom experience for the students at Anglo-American University, the oldest private university in the Czech Republic. Final-year and visiting students taking Strategic Marketing and Planning course taught by professor Chris Shallow will work a class project offered by SeaCat.

Continue reading ...

community kitchen-news

Published on October 25, 2014

Video: A Mini Teaser of Cat

Here at the Cat quarter, we got lots of questions about Cat, wondering how Cat can be so fast, easy-to-use and affordable. So we wrote documents, emailed to address these questions. But then we got tired and played with animation instead. For now, enjoy the Catty video.

Continue reading ...

video

Published on October 10, 2014

SeaCat tutorial - Chapter 3: Introduction to REST Integration (iOS)

The goal of this article is to extend the knowledge and develop an iOS application which is able to comunicate with REST interface provided by Node.js that we are going to create as well. A full integration with SeaCat is essential for information security of our example.

Continue reading ...

tech tutorial ios osx

Published on October 07, 2014

The Cat at Dublin Web Summit

We are very excited to be at the world’s largest startup event and one of the coolest tech conferences this coming November in Dublin. SeaCat was chosen by the Summit’s Alpha programme together with other highly promising startups to exhibit for free.

Continue reading ...

kitchen-news events startups

Published on October 03, 2014

SeaCat tutorial - Chapter 2: Simple Post (iOS)

The goal of this article is to create a simple iOS client which generates a simple POST Request which will be read in host written in Node.js and the output generated in the console. The whole comunication will be handled by SeaCat which help us to establish fast and secure connection among our key components.

Continue reading ...

tech tutorial ios osx

Published on September 09, 2014

SeaCat tutorial - Chapter 1: Hello World (iOS)

This is the first practical tutorial in our tutorial series to demonstrate the strength and capabilities of SeaCat secure access solution. Our goal is to develop several sample applications and uncover the best practices you might be interested in.

Continue reading ...

tech tutorial ios osx

Published on August 18, 2014

SeaCat FREE trial

In order to help you to evaluate and use our product we have prepared an trial version that is freely available for download. Trial version is limited to emulator/simulator only, you cannot use that on a real device. There is however no expiration date of a trial, so feel free to use it for any amount of time you need for the evaluation or even an actual development.

Continue reading ...

tech trial

Published on August 17, 2014

SeaCat Mobile Secure Gateways' Performance Test

We decided to perform this test to validate our architectural, design and implementation decisions in regards to SeaCat performance. Our goal was to build the best-in-class product using the most advanced techniques to deliver highest possible throughput yet not compromising the security of the communication. Results of the test have been fed back into our development team to improve further overall performance characteristics of the solution.

Continue reading ...

tech

Published on July 21, 2014

TeskaLabs Announces the Release of SeaCat Mobile Secure Gateway for iOS

TeskaLabs, a new hi-tech startup, just launched the first of its security solution for enterprise mobile applications, SeaCat Mobile Secure Gateway, enabling developers to build security directly into their mobile applications, protecting the communication channel and the backends.

Continue reading ...

press

Published on June 01, 2014

What TCP port to use with SeaCat?

SeaCat requires to specify one TCP port that is eventually used for client-gateway communication. Clients connect to this port to establish TLS channel that is used to exchange requests and related responses. SPDY-based communication protocol is used for traffic in this channel.

Continue reading ...

tech

Published on May 23, 2014

SeaCat Mobile Secure Gateway Architecture

SeaCat Mobile Secure Gateway is built using the SeaCat Application Security Platform. It provides strong protection against multiple types of cyberattacks by securing all application components, including the mobile application, network paths, which present an entry point to the enterprise network and application’s backend servers. It reduces an administrator's workload with easy PKI administration of distributed large-scale mobile applications. SeaCat Security Platform has been carefully designed to be flexible, fast, and highly secure.

Continue reading ...

tech

Published on May 18, 2014

Software architect's point of view: Why use SeaCat

I've recently received an interesting question from one software architect: Why should he consider embedding SeaCat in his intended mobile application? This turned into a detailed discussion and I realised that not every benefit of SeaCat technology is apparent at first glance. Let me discuss the most common challenges of a software developer in the area of secure mobile communication and the way SeaCat helps to resolve them. The initial impulse for building SeaCat was actually out of frustration of repeating development challenges linked with implementation of secure mobile application communication. So let's talk about the most common challenges and how SeaCat address them.

Continue reading ...

tech development

Published on April 16, 2014

SeaCat trial for iOS on Mac OSX

This blog entry is meant to help you to start using SeaCat component on your Xcode iOS development environment. It contains instructions how to install and configure SeaCat gateway and how to integrate SeaCat client into your iOS application. SeaCat gateway is a secure gate to the restricted network. It allows access only to selected HTTP hosts and prevents exposure of others. It also secures communication with SeaCat clients that are typically in the Internet. SeaCat client becomes part of said mobile application and provides secured channel to SeaCat gateway and to target hosts in the restricted network. It ensures mutual security of the connection and transferred data.

Continue reading ...

tech trial ios osx

Published on March 14, 2014