Checkmarx Blog

Are You on Tinder? Someone May Be Watching You Swipe

The Checkmarx Security Research Team found disturbing vulnerabilities in a highly popular dating application used by people across the globe – Tinder. The report features how a malicious attacker can take advantage of these vulnerabilities to cause serious privacy breaches to an unsuspecting user.

Read More ›

The Top 5 Exfiltration Attacks on WebViews

This is part three of a three-part series. Click for part 1 and part 2.    WebViews are a huge advantage when it comes to portability. But at what cost?   By allowing Web content to interact with native functions, a window of attack possibilities is opened. Old versions of Android (until API 17) allowed Remote Code

Read More ›

The Year of GDPR

Way back in 2012, the European Commission laid down initial plans for the European Union’s data protection reform. It took the relevant parties four years to reach an agreement on what would be involved and how it will be enforced. And now, here we are! As close as ever to the May deadline in the

Read More ›

Looking Ahead: What’s in Store for Cybersecurity in 2018?

As the cybersecurity world is left reeling from record breaking hacks and breaches which occurred (or surfaced) in 2017, the importance of organizations ensuring their code’s security is rightfully taking the spotlight as the new year begins.   However, in taking a step beyond code security, it’s critical that organizations of all sizes and those

Read More ›

The Forrester SAST Wave: Not a True Reflection of the Market

Checkmarx leads the SAST market and displays the most significant and impressive growth in the industry. In this blog post, we demonstrate our growth and 2017 accomplishments in light of the latest Forrester Wave, which we feel fails to reflect the SAST market as it is.

Read More ›

Smart Cities: Can My City be Hacked?

Our connected devices make life easier on us as individuals, and the conveniences afforded to us by connecting technology to the physical world around us are compounded when we expand the reach from individuals to a greater population, – entire cities.   While cities have been adapting new technologies that connect the physical world to

Read More ›

JavaScript Attacks in WebViews

This is part two of a three-part series. Click for part 1 and part 3.    JavaScript is widely used due to its outstanding functionality. Its presence in a website can solve many problems, however it can also introduce critical security issues. It is this very compromise that has to be carefully analyzed in the decision of allowing or

Read More ›

Jump to Category