SE Labs

Posts filed under 'Analysis'

How to research mobile app security

Advice says, “research the app.” But where do you start with mobile app security?

mobile app security

Most people want to keep their mobile devices secure. But how do you know the mobile app you are going to install is safe? You can’t trust the app stores. Most Android malware comes from Google’s Play Store. The good news is there are loads of articles giving advice on how to do so. Almost inevitably, one piece of advice will be, “research the app” or “research the company”. The advice is true, because you should check things like that. But rarely does the advice go into detail, because it’s hard to research mobile app security properly! We’ll show you how.

Research the app in 6 easy(ish) steps

Researching a mobile app before you install it is important. There are plenty of fake apps out there and, possibly even worse, some that work but also include unwelcome ‘things’. These ‘things’ could be intrusive ads, extensive tracking of your behaviour or even malware.

Read more >

Outdated law firm tech creates tension with clients

Legal firms vs. data security: How to solve the tension between lawyers, their IT teams, clients and data security

outdated law firm tech

Traditional ways of working in the legal world clash with modern technology and tech-savvy clients. Outdated law firm tech might be safe, but it makes customers unhappy.

There is a tension between lawyers, their IT teams and their clients. Law firms don’t like to recognise this, at least publicly. But there is a clash between “the way things are done”, customer service and the convenience provided by modern technology.

Read more >

SE Labs Security Conference 2021

London, UK, 27th May 2021

SE Labs Security Conference 2021

SE Labs is holding its annual security conference on the 27th May, 2021

Email security services protection

This year’s focus is email security and the services that claim to provide protection against email threats. Delegates will discuss the latest threat intelligence about email threats. Attendees, including all of the main email security companies, will also examine past, present and next-generation testing methods.

Together we hope to advance the testing of email security like never before.

Read more >

How they sell security (and we buy it)

The world of cyber security sales is unclear at best

The secret world of cyber security sales is fascinating. And shady. If you ever wondered how they sell security, and how we buy it, we have a treat for you.

Our security reports help you choose the best anti-malware solutions for your organisation and your family. These latest lab results look at how the most popular products handle the threats everyone faces on a daily basis, as well as the sort of targeted attack you hope never to encounter (but might).

ENDPOINT PROTECTION: NEW REPORTS ONLINE!

Read more >

DE:CODED – What Does a Breach Look Like?

“I always work on the assumption that you’ve been compromised”

DE:CODED is the official podcast from SE Labs.

Listen on Apple Podcasts Listen on Spotify Listen on Google Podcasts Listen on Stitcher RSS Feed

Or play all Series 1 episodes here | and on YouTube

🥇 Winner of the Best Up & Coming Podcast 2021 award 🥇


Show notes for series 1, episode 7

What does a computer security breach look like? We talk about the things journalists don’t cover. And we examine some areas that people in the industry don’t like to talk about.

Read more >

DE:CODED – Selling Security: The Insider’s Guide

“You’re thinking: How much truth is in that report?”

DE:CODED is the official podcast from SE Labs.

Listen on Apple Podcasts Listen on Spotify Listen on Google Podcasts Listen on Stitcher RSS Feed

Or play all Series 1 episodes here | and on YouTube

🥇 Winner of the Best Up & Coming Podcast 2021 award 🥇


Show notes for series 1, episode 5

Companies spend trillions on cyber security each year. But how do they decide which products and services are the best?

Read more >

What does a breach look like?

Understand what a real hacking attack looks like to the attacker and defenders

breach visualisation

The IT security world is rocked by news of breach after breach, including the shocking disclosure of the SolarWinds attack. Data is stolen, deleted or corrupted and… well you know. It’s a total mess. Journalists focus on basic outcomes, while technical blogs look at esoteric technical details. We’ve explained, in laymen’s terms, what a breach looks like from an attacker’s point of view. And from the position of the defenders.

Read more >

SolarWinds Breach – After the Storm

Is trust as we know it dead?

The blind leading the blind. Supply chain attacks brought into focus by the SolarWinds breach

The SolarWinds breach was arguably the most significant computer hack of the decade. At least, of those breaches that we know of. Rather than jump straight into judgement and analysis, we wanted to watch as things unfurled and provide a balanced view with facts and clear thoughts later, rather than fast attention-grabbing reactions.

Read more >

Internet opinions on security tests

And screaming into the abyss!

opinions on security tests

We’re all entitled to our opinions. So why is it so aggravating when “someone is wrong on the internet?”

Security forums vs. test results

People are biased. It’s natural human behaviour and not something we can correct. Not least because we have our own biases… In fact, research indicates that providing evidence to counter someone’s argument actually entrenches their initial position! Here, we’re going to explore opinions on security testing.

Read more >

2020: year of the breach

Solid endpoint protection is a bare minimum

Solid endpoint protection

If it feels like new breaches are reported every week, it’s because they are. Attackers are taking no prisoners and are successfully breaking into businesses, political organisations and systems belonging to individuals. Most believe they have solid endpoint protection in place.

It’s not like a bank robbery, where the bad guys have to spend lots of time and effort to put themselves at physical risk for the sake of one big score. Ransomware extortions can happen in parallel. Criminals sit in front of screens watching piles of victims become compromised.

ENDPOINT PROTECTION: NEW REPORTS ONLINE!

Read more >

About

SE Labs Ltd is a private, independently-owned and run testing company that assesses security products and services. The main laboratory is located in Wimbledon, South London. It has excellent local and international travel connections. The lab is open for prearranged client visits.

Contact

SE Labs Ltd
Hill Place House
55A High Street
Wimbledon
SW19 5BA

020 3875 5000

info@selabs.uk

Press