Welcome!

News Feed Item

Jeff Ifrah Promotes Security Awareness for Website and Mobile App Developers

WASHINGTON, DC -- (Marketwired) -- 04/15/14 -- Last month the two mobile apps, Fandango and Credit Karma, settled with the Federal Trade Commission (FTC) over charges that both companies had falsely represented the security of their mobile apps, leading to an insecure transmission of sensitive personal data of millions of customers. The FTC argued that the credit monitoring company, Credit Karma, and the movie ticketing service, Fandango, both failed to take appropriate measures to guarantee secure transmission of customers' sensitive personal data, allowing attackers to intercept and access email addresses, names, passwords, social security numbers, credit card information and credit report information. Now, the FTC ordered the two companies to put comprehensive security measures in place to minimize security risks during the use of their mobile apps. On top of that, Fandango and Credit Karma agreed to undergo security assessments every other year for the next 20 years. After the settlement, Edith Ramirez, FTC Chairwoman, said: "Our cases against Fandango and Credit Karma should remind app developers of the need to make data security central to how they design their apps."

Fandango and Credit Karma both could have avoided the charges by the FTC if they had enabled SSL certificate validation. SSL, short for Secure Sockets Layer, is an industry standard that ensures that no attacker can intercept the transmission of sensitive data and secures the communications of an app. Applications that use the SSL protocol verify certificates presented by online services to guarantee a safe and encrypted transmission. If the SSL certificate validation enabled, as in the case of Fandango and Credit Karma, the mobile app becomes vulnerable to man-in-the-middle attacks. While the FTC demonstrated an existing vulnerability, no consumer information was compromised by Fandango's nor Credit Karma's failure to put security measures in place, which could explain why the FTC agreed to a settlement without monetary penalties. In an article regarding the recent development of FTC case against Fandango and Credit Karma, Sarah Coffey of Ifrah Law, a Washington-based law firm founded by attorney Jeff Ifrah, points out the importance for companies to take necessary security steps before launching a new mobile app.

Jeff Ifrah and his team of attorneys are experienced in advising companies that are approached by the Federal Trade Commission or other state agencies. Jeff helps his clients to put appropriate policies and procedures in place and develops a sound legal strategy in case a company gets involved in potential security or data breach accusations. With the growing representation of companies on the Internet, collecting, using and protecting consumer information plays an increasingly important role. As a result, consumer advocacy groups and government regulators are keeping a watchful eye on companies to ensure they adhere to all rules and regulations. Jeff helps clients from various industries as well as website operators to draft their privacy policies to avoid legal issues with regards to data protection.

Attorney and Ifrah Law's founder, Jeff Ifrah, specializes in the defense of federal investigations and litigation. Clients come from many regulated industries and involve primarily e-commerce, e-business, and government contracts. He started his career as a trial lawyer and officer in the U.S. Army's Judge Advocate General's Corps, followed by an appointment as trial counsel to the U.S. Army Communications-Electronics Command at Fort Monmouth. Jeff then gained experience as a special assistant U.S. Attorney in New Jersey. Jeff's legal excellence is widely recognized -- Chambers USA has recognized him for three years in a row as one of the leading lawyers in the United States for litigation in the fields of White Collar Crime and Government Investigations.

Jeff Ifrah Law: http://www.jeffifrahlaw.com

Facebook: http://www.facebook.com/jeff.ifrah

Twitter: http://www.twitter.com/jifrah

Embedded Video Available

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2568252
Embedded Video Available: http://www2.marketwire.com/mw/frame_mw?attachid=2568257

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact Information
PR Agency Contact:
ICMediaDirect.com
TEL: 1.800.595.0821
www.ICMediaDirect.com

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.