Checkmarx Blog

Top 5 Secure Android Development Tips

Over 50% of US smartphone users are now actively using Android devices and the security aspect of Google’s mobile platform is under constant scrutiny. With new vulnerabilities and hacking POCs making the news on almost a daily basis, safety concerns are rising. So what lies ahead for this customizable and user-friendly, albeit vulnerable, mobile operating system? How can

Read More ›

Application Security

Eye Of The Hacker: Analyzing Today’s Top Application Security Solutions

Rafay Baloch takes no prisoners when it comes to exposing vulnerabilities. An ethical hacker since the young age of 14, Baloch is now known within InfoSec circles as a seasoned security expert. His ever-growing list of “victims” includes leading platforms such as Android, Google, PayPal and Nokia, with the former earning him worldwide acclaim.

Read More ›

SAST vs IAST – Which AppSec Solution Is Right For You?

With cybercrime escalating worldwide, application security has become a big challenge for organizations and governments. Penetration (Pen) Testing and Dynamic Application Security Testing (DAST) are capable solutions, but have their fair share of inherited deficiencies. Interactive Application Security Testing (IAST), an upcoming security methodology, is being increasingly compared with Static Application Security Testing (SAST). This

Read More ›

Beyond XSS and CSRF: Same Origin Method Execution

Unless you were living under a rock last fall, you heard about the major iCloud hack that saw nude pictures of A-list celebrities posted all over the web. The fact that someone could hack into private clouds and steal the sensitive data contained within alarmed web users around the world.   That wasn’t the only

Read More ›

All You Wanted To Know About Identity Theft

With the internet revolution in full swing, web and mobile applications are extracting more and more private information from us. While this is definitely making life easier and enhancing our productivity, large databases of Personally Identifiable Information (PII) are left exposed due to lack of security awareness and/or vulnerable applications. Identity Theft has become a

Read More ›

What you need to know about Stagefright?

  Let’s start with a temporary workaround to avoid becoming infected Open the Hangouts App Click the hamburger menu and select “settings” Select SMS Select Hangouts as your default SMS app Uncheck ‘Auto-retrieve MMS’ Now that we got that out of the way we can start talking about the Stagefright vulnerability itself. What is Stagefright?

Read More ›

Static Analysis vs Pen Testing – Which One Is Right For You?

Penetration (Pen) Testing has long been the go-to tool for organizations looking to safeguard their applications. But the ever-evolving hacking techniques are exposing this aging solution’s shortcomings. The growing consensus in security circles is that applications need to be bolstered from the core – the source code. This is exactly where Static Analysis enters the picture, helping detect application

Read More ›

Must Know Security Buzzwords For Application Builders and Defenders

In security, there is always a new term being thrown around, and it’s important to know what each one means for anyone involved in the spectrum of security management, from CISO to security team to development team. Without the common language, conversations around security could feel altogether foreign for different folks.   Say what you

Read More ›

Jump to Category