E Com Security Solutions: Security Blog

The Official Security Blog of E Com Security Solutions for advancing the security capabilities of leading businesses and organizations throughout the world.

­

Joker Malware Infects 500K Users In 24 Android Apps On Google Play

A new Android malware called Joker (after the manic Batman villain) has been discovered which can gain access to a victim’s SMS messages, contacts list, and other specific device information. It can also sign victims up for premium subscription services without their knowledge. The malware has been reported to have

September 10th, 2019|Categories: Cyber Security|

Soc 2 Control Mappings against multiple standards

Third party organisations that successfully complete a SOC 2+ audit can offer their clients reasonable assurance to demonstrate that effective internal controls are in place and these controls pertain to the criteria covered in the AICPA Trust Service Principles, as well as many of the detailed requirements covered in other

April 24th, 2019|Categories: compliance|

How to achieve HIPAA Compliance for Medical Software applications?

In relation to medical software applications, the term HIPAA compliant means that the application meets the technical and physical safeguards of the HIPAA Security Rule. If you are hosting an application in a HIPAA-compliant environment then it does not make the application HIPAA-compliant. If you build an eHealth or mHealth

April 24th, 2019|Categories: Web Application Security|

The SEBI Audit framework for Mutual Funds or Asset Management Companies

The Securities Exchange Board of India (SEBI) on April 11, 2019 issues system audit framework for mutual funds or Asset Management Companies (AMCs). SEBI considering the importance of systems audit in asset management activity, the revised guidelines are placed at Annexure 1(Page 3). On the date of issuance of this

April 24th, 2019|Categories: Security NEWS|

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0

The Cloud Security Alliance has published the Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 (“Guidance v4.0”) is licensed by the Cloud Security Alliance. The Cloud Security Alliance promotes implementing best practices for providing security assurance within the domain of cloud computing and has delivered a practical,

April 24th, 2019|Categories: cloud security|