-
By John K. Waters
A new report from application security vendor Veracode paints an unflattering picture of Java developers, finding 88 percent of Java applications contain at least one vulnerable component.
-
Amid increasing reports of cyberattacks and data breaches, open source security company Flexera has published the results of a study examining the risk of using vulnerable open source code in enterprise applications and systems.
-
By John K. Waters
More than 90 percent of the vulnerabilities can be exploited remotely without authentication; about 60 percent can allow attackers to perform remote denial-of-service attacks; and more than 72 percent of these vulnerabilities can be easily exploited, because their attack complexity is low.
-
To improve the security of Android apps offered in the Google Play store, the search giant has launched a bug bounty program to award $1,000 to hackers who discover bugs in select, popular apps and work with developers to fix them.
-
Attack campaigns are currently being waged against the latest Adobe Flash security hole, the company announced on Monday.
-
WPA2, the gold-standard protocol for protecting Wi-Fi networks, has been found to have a serious security vulnerability.
-
GitHub is boosting the security capabilities of its software development platform, introducing new open source project dependency graphs and promising alerts when bad actors show up in those graphs.
-
By John K. Waters
Without baking in proper training and education, a new study suggests that the rush to adopt DevOps practices might be leading enterprises to an insecure place.
-
By John K. Waters
"The attack vector of the Java platform is huge," says Waratek security architect. "More and more vulnerabilities are discovered that affect both the legacy and newer versions."
-
Data from 12th annual WhiteHat Security study shows Android apps are plagued by incorrectly set backup flags, while many iOS apps allow unsecure cookies.
-
Apperian updated its mobile application management platform with more functionality designed to boost the security of enterprise mobile app data.
-
Developers are once again being blamed for cloud security vulnerabilities, this time in a new report from Appthority, which found terabytes of enterprise data exposed on cloud back-ends, including personally identifiable information.
-
Developers lacking security training unknowingly jeopardize public cloud computing environments, says a new report from RedLock Inc.
-
The sorry state of open source security was further revealed by Google, which reported its fuzz testing tool has found hundreds of potential security vulnerabilities in the five months since it was launched.
-
Researchers at the University of Michigan have published a paper in which they break new ground in investigating security implications of open Internet ports in Android applications, finding flawed apps that leave millions of users vulnerable to attack.
-
Black Duck report finds "widespread weakness in addressing open source security vulnerability risks."
-
German researchers have published a paper finding that developers do indeed copy and paste code directly into their open source software, which can lead to the introduction of security vulnerabilities if that code comes from flawed online tutorials.
-
By John K. Waters
Here's a roundup of recent news and product announcements around Java and Java-related technologies.
-
By John K. Waters
Here's a roundup of this week's news and product announcements around Java and Java-related technologies.
-
By John K. Waters
It provides a "mitigation fabric" for server and hybrid cloud security that expands the company's security coverage from the endpoint to the datacenter,
-
By John K. Waters
Old vulnerabilities in both Java and Python that allow attackers to bypass firewalls and access local networks by injecting malicious commands inside FTP URLs resurfaced this week when two security researchers noticed that they remain unpatched.
-
Former smartphone manufacturer announced it's entering the Communications Platform-as-a-Service market, with an emphasis on security.
-
Adding to the existing portfolio of some 700 programming languages is a new release candidate for Scramblecode, a security-oriented offering that encrypts everything from compilation to variables in memory.
-
Risks also result from an emphasis on end-user convenience over security and organizations' lack of urgency to address threats.
-
By John K. Waters
A presenter at the upcoming RSA security conference explains how security must be continuous and automated to be successful in DevOps.