Sonatype on Wednesday launched a new on-demand service that analyzes the open-source components in Java applications for security, licensing and quality problems.
A well-known hacking tool aimed at Java vulnerabilities appears to have gotten an upgrade designed to exploit a newly-patched security flaw addressed in the Java SE 6 Update 33 and Java SE 7 Update 5.
The Cloud Security Alliance (CSA) has disclosed plans to offer a certification program for providers of cloud-based products and services.
Two separate flaws in the PHP scripting language found in a large majority of Web sites have been seen being exploited in the wild by attackers.
Apple says a Java update the company released on April 3 fixes the headline-grabbing security flaw exploited by the Flashback Trojan botnet.
A recently disclosed Java vulnerability has been updated in the BlackHole kit, a popular exploit set among hackers. Security experts warn that a majority of Java users could be at risk.
Google's newly launched Service Accounts will provide certificate-based authentication to APIs for server-to-server interactions.
According to a lawsuit filed in a Texas court this week, makers of some of the most popular mobile apps are collecting user information without the consumer's consent.
Microsoft, partnered with with secured and managed mobile enterprise app company Good Technology, will bring encrypted e-mail services to the Windows Phone platform.
HP today unveiled a new platform of integrated security solutions that, according the company, is designed to "bridge the gap between security and IT operations of security solutions."
Six tech companies have agreed to provide clear information on their individual privacy policies before their products are downloaded.
DDoS attacks are targeting IPv6 networks for the first time since the Internet protocol started implementation last year.
A large malware ring might have infected more than 5 million Android users with fraudulent apps, according to Symantec.
ForgeRock has released version 2.0 of its OpenIDM identity management offering.
According to a Microsoft Security Intelligence Report, released last month, the most common software exploit type in the first half of 2011 was associated with vulnerabilities in Oracle's Java Runtime Environment (JRE).
Researchers at Acros Security have found and disclosed a Google Chrome flaw it its built-in sandbox protection that could lead to a remote code execution attack.
Attacks against smartphone applications and browsers will continue to rise as the adoption of tablets and smartphones increase.
Investing the time to apply the proper auditing and testing techniques is worth the time, according to security experts.
The creation of malware targeted towards Android devices has increased by a factor of five in the past 12 months.
An updated list of the top 25 coding errors considered to be responsible for the majority of security vulnerabilities plaguing software was released yesterday, with input from a coalition of government, academic and private sector security organizations.