Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


07:59 PM
Dark Reading
Dark Reading
Products and Releases

Unified Test Initiative Taps ChosenSecurity For Mobile Code-Signing Platform

Platform aimed at Java developers using the newly relaunched Java Verified program

NEWTON, MA " July 21, 2009 " ChosenSecurity today announced that the Unified Test Initiative (UTI) is using its TC TrustCenter division to provide a mobile code signing platform for global Java developers using the newly relaunched Java Verified program.

ChosenSecurity's TC TrustCenter offers on-demand digital certificate management services.

The UTI is a mobile industry cooperative with the goal of growing supply and demand for high quality mobile Java applications by reducing fragmentation. UTI is achieving this by providing a comprehensive test battery, known as the Unified Testing Criteria, against which mobile Java developers can test their applications. UTI members are: ACCESS, LG Electronics, Motorola, Nokia, Orange, Samsung, Sony Ericsson, Sun Microsystems and Vodafone Group.

The Java Verified program is managed by the UTI and has been serving the mobile industry for over five years. It has a new streamlined testing and signing process that includes ChosenSecurity's vetting and signing services. Program enhancements provide developers with tools to ensure quality throughout the entire testing process. Enhancements also provide the ability to test applications across a greater number of devices at a significant cost savings, compared to previous testing models. Applications that pass Java Verified program testing are digitally signed and returned to developers, earning them a mark of quality that will help speed their path to market and permit the applications to run, without excessive security prompts, on the device. For more information visit: http://javaverified.com.

To date, the Java platform has attracted an estimated 6.5 million software developers, making it the largest and most active developer community in the world. Java powers more than 4.5 billion devices including 800+ million PCs, 2.1 billion mobile phones and other handheld devices, 3.5 billion smart cards and a range of other devices.

"We selected ChosenSecurity's vetting and mobile code signing services for Java Verified because of its 10+ years of experience in the security market, proven vetting program and technical expertise," said Martin Wrigley, chair of UTI. "We consider ChosenSecurity's TC TrustCenter an important partner in making our Java Verified program successful."

"We are honored to be offering our services to the world's 6.5 million Java ME developers through UTI's Java Verified program," said Bob Steinkrauss, president and CEO, ChosenSecurity, Inc.

About TC TrustCenter As the first to provide on-demand managed PKI services over the Web, TC TrustCenter provides trust globally to digital communications between employees, clients, partners and suppliers. For more than 10 years, TC TrustCenter has been providing a broad range of cost effective project and industry PKI solutions, with considerable references of international customers. Its portfolio ranges from solutions for phishing protection, security of online transactions, and electronic invoicing to broad PKI solutions and managed security services. Its on-demand digital identity solutions are cost-efficient, highly secure and fast to implement. TC TrustCenter is accredited according to the German Signature Act, European Signature Act, Identrust, SAFE, T"VIT and SISAC. For more information, see www.trustcenter.de/en About ChosenSecurity, Inc. (www.chosensecurity.com) ChosenSecurity provides digital trust between employees, clients and suppliers doing business electronically through on-demand certificate management services. The company's solutions enable a wide range of digital trust applications to provide strong authentication, secure e-mail, digital signatures, data encryption and support compliance with privacy and other regulations. ChosenSecurity was the first to provide digital certificate management through a Software as a Service model and remains the leader through its breakthrough economics, versatility and implementation speed for enterprises. Unlike traditional PKI and private certificate authority options, ChosenSecurity solutions can be implemented in 70% less time and 70% less cost.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
4 Security Tips as the July 15 Tax-Day Extension Draws Near
Shane Buckley, President & Chief Operating Officer, Gigamon,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...