Posts by Sharon Solomon:

Deloitte

Checkmarx Reaching New Heights – Now Second Highest Ranked Security Company In 2013 Deloitte Fast 500

Dec 16, 2013 By Sharon Solomon | Checkmarx is breaking all barriers. The Israeli IT Security firm has stormed into the Deloitte top-500 fastest growing EMEA companies, taking 69th place overall in the 2013 rankings. Technology Top 500 is a unique ranking research project, conducted annually by Deloitte Touche Tohmatsu Limited (DTTL). Technology, telecommunications, software and internet companies are scanned and studied during the ranking process. Both private and public sector concerns are eligible for evaluation.

</Read More>
iStock_000020450842XSmall

Balloon Pop 2 Taken Off Android Play Store – WhatsApp Snooping Exposed

Dec 13, 2013 By Sharon Solomon | Mobile malware has come a long way in recent years. The latest exploit was exposed this week when the popular “Balloon Pop 2”, played and enjoyed by thousands of Android users, was found to contain a malicious code that enabled eavesdropping on WhatsApp conversations. Google has taken the game off its Play Store app market.

</Read More>
iStock_000017757979XSmall

Stop the Neglect – Scan Your Source Code Before You Regret

Dec 11, 2013 By Sharon Solomon | Hacktivism, commercial malware and criminal exploitation have become the norm in today’s cyberspace. This worrying trend has magnified the need for a comprehensive testing solution that can be integrated into the SDLC. Enter Source Code Analysis (SCA).

</Read More>
iStock_000019262178XSmall

UCSB Hosts International Hacking Contest – Students Lock Horns

Dec 09, 2013 By Sharon Solomon | The UCSB hosted yet another mega-contest featuring the best hacking minds in the world. Pizza, coffee and laptops were found in abundance on the premises last weekend, as young minds from over 40 countries did battle for the bragging rights and a $1,024 bounty.

</Read More>
iStock_000023444420XSmall

Hacker’s Paradise – New Virus Transfers Stolen Data Using Inaudible Sounds

Dec 06, 2013 By Sharon Solomon | Air-Gap Jumping Communication. Networkless hacking. Sci-fi movie themes are now turning into reality. German researchers Michael Hanspach and Michael Goetz have created what can potentially become the driving force behind the next-gen malware. Security experts be warned – offline computing is not going to be safe for long. 

</Read More>
iStock_000026630984XSmall

Free Wi-Fi Hotspots – A Risky Luxury

Dec 04, 2013 By Sharon Solomon | The wireless revolution has turned internet access into a basic necessity. Social media networking and entertainment on-the-go are in high demand. In this reality, Wi-Fi hotspots are seen as blessings, even when the signal is coming from an unknown source. But this is a huge security risk that people rarely take into consideration.

</Read More>
iStock_000011757339XSmall

Istana Website Hacked; Singapore Cybercrime On The Rise

Dec 02, 2013 By Sharon Solomon | The list of hacked websites just keeps getting longer. The Istana website, official cyber-domain of Singapore’s Presidential Office, is the latest high-profile casualty. The Singaporean police have arrested two suspects, who have been charged under the Computer Misuse and Cybersecurity Act, punishable by up to five years in prison.

</Read More>
iStock_000025113752XSmall-225x300

Top-10 Essential Challenges of Mobile Security

Nov 29, 2013 By Sharon Solomon | Mobile Security has become a crucial aspect of protecting sensitive data and information. Malicious attacks once focused on PC’s have now shifted to mobile phones and applications. Mobile makers are aware of this fact and are investing heavily in security.

</Read More>
Lock-200x300

NSA Malware Attacks Exposed; Over 50,000 Computers Hacked

Nov 26, 2013 By Sharon Solomon | Edward Snowden, the infamous ex-NSA employee, is still creating waves with his leaked documents. The latest evidence sheds light on the NSA’s hacking capabilities and the extent of the damage done. Tailored Access Operations (TAO), a special unit with a task-force of more than a thousand hackers, orchestrated the cyber-attacks.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.