The State of Application Security A Research Study by Security Innovation, Checkmarx’s partners and Ponemon Institute LLC
A� We are happy to share the news- Checkmarx is aA�finalist in the Global Security Challenge! GSC 2013A�seeks to discover the most promising young companies, university spin-offs and concept projects from around the world, capable of providing the next generation of cyber protection and leading the charge against some of the biggest threats of today
Two months ago Checkmarx has published a research revealing the security state of WordPress’s 50 top plugins. Another CMS joins the list and this time it’s Joomla- asA�simpleA�vulnerability was exploited to infect thousands of websites with malware. The sites were hacked to serve up the prevalent Blackhole exploit kit, which in turn infected usersa�� systems
Thomas Hatley, an ordinary citizen from Oregon was surprised to receive a weird phone call by a complete stranger who hacked his smart home while speaking. The stranger- David Bryan, Security Researcher at Trustwave, managed to hack into Thomas’s “smart” house through an automation system that allows a remote control of electrical devices, originally meant
Who would have imagined that vehicles are starting to require the same protection as laptop computers? Charlie Miller and Chris Valasek, sponsored by the Pentagon’s research facility demonstrate in a short videoA�how easily a car can be hacked in real time and how they gain full control over the vehicle’s computer. View full article
eCommerce grew by 16% while Cybercrime grew by 23%. This finding, by Martec shows the growth of cyber attacks in comparison to eCommerce in 2012. A�Despite this growth, says the report, which questioned 100 leading UK retailers, retailers arena��t taking fraud as seriously as they should, and as a result smaller retailers have paid seven
Major data breaches, leaks and hacks often consume the news, but the sheer numbers involved a�� 6 million records or 300,000 leaked passwords a�� may be hard to conceptualize, especially in comparison to other attacks.
Developers are often overwhelmed by the number of vulnerability findings returned by source code analysis tools. But a proper visualization of the code flow can pinpoint optimal code fixes. How? This webinar shows how visual flow graphs can be automatically generated, even without the knowledge of the codea��s logic. Using OWASPa��s Web Goat as a
Checkmarx is thrilled to introduce Cert2Connect as our new partner!A� A�Cert2Connect is a company located in the Netherlands that provides solutions and professional services in the field of information security and risk management, Cyber Security, Cloud and Mobile Computing platforms. Cert2Connect plays a crucial role in advising organizations for Cloud and Cyber security cost-effectively.