Posts by carolineb:

What Apple and Google are not Telling you About Mobile Device Security (infographic)

Jun 11, 2013 By carolineb |   Source:

</Read More>

Have you ever been scared of… charging your iPhone?! think twice.

Jun 06, 2013 By carolineb | A way to hack into an iPhone only through charging the phone! Georgia Institute of Technology researchers figured out how to attack iPhone with malicious software through a charging cord.
The proof of concept will be presented by the institute at Black Hat USA 2013- giving you another good reason to come to the conference (visiting the Checkmarx booth).

</Read More>

The AppSec How-To: Choosing a SAST Tool

Jun 04, 2013 By carolineb | Given the wide range of source code analysis tools, security professionals, auditors and developers alike are faced with a question:
How to assess a Static Analysis Software Testing (SAST) tool for deployment? Choosing the right tool requires different considerations during each stage of the SAST tool evaluation process.

</Read More>

Summarizing a great month of May

May 28, 2013 By carolineb |  We are glad to summarize a great month of events !
Starting in Infosec Israel, continuing to the Paris- Forum “Matchmaking in the Cloud” and concluding our monthly activities at AusCERT, Australia, we’d love to share our insights.

</Read More>

Hacktivists publish personal details of South African citizens to “embarrass the authorities”.

May 27, 2013 By carolineb | More than 15,000 South African citizens fell victim to the hacking attack of the SAPS (South African Police Service) website, where all personal information of those who reported crimes were stored.
Citizen’s personal and confidential details were exposed on the net, usernames and passwords of the local Police Services personnel leaked and not least… it’s not something South African authorities can be proud of.

</Read More>

Learn more about security – new WebGoat movies

May 20, 2013 By carolineb | OWASP publishes a list of new WebGoat movies to teach web application security concepts.
WebGoat is an application that enables developers to practice secure programming by demonstrating vulnerability examples and ways to fix them.

</Read More>

Checkmarx Announces Partnership with Deutsche Telekom to Offer a Software Security Solution

May 16, 2013 By carolineb | We are proud to announce the launch of this important and strategic partnership between Checkmarx and the Deutsche Telekom’s Developer Garden.
  Press Release: Checkmarx – Tue, May 14, 2013 TEL-AVIV, Israel, May 14, 2013 /PRNewswire/ – The leader in Application Security Testing solutions, Checkmarx
Ltd. is today announcing a partnership with Developer Garden, the Deutsche Telekom AG (DAX; DTE) ecosystem for developers.

</Read More>

If you wanna hack- hack, don’t shoot

May 13, 2013 By carolineb | The biggest bank robbery in history- no guns, no masks and no threats.
A gang of Cyber Criminals managed to hack into prepaid credit databases (ATM) and steal $45 million. This might be registered as the biggest bank robbery in history. US Bank Muscat has been a victim of this cyber attack with a total loss of $40 million. World-wide law enforcement agencies have been investigating this case, arresting numerous suspects. Read more here

</Read More>

A wonderful week with our Asia Pacific Partners at Checkmarx Advanced Training

Apr 30, 2013 By carolineb |
Following the Checkmarx Advanced Training week in Israel, we can conclude that is was a great success for everyone involved!
We were glad to have our Asia Pacific Partners in Israel and participate in a week of intensive Advanced Training on the Checkmarx tools, new features, brain storming and of course unique tours in Tel Aviv, Jerusalem and the Dead Sea. Enjoy the pictures posted on our Facebook Gallery

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.