Checkmarx Blog

Credit Card Breach Being Investigated By Hotel Management Co.

A company that manages some of the biggest name brand hotel franchises across the U.S., including Hilton, Westin, Marriott and Sheraton, has apparently been dealing with a potential data breach where thousands of guests’ credit card data was stolen over a period of at least nine months.

Read More ›

Justin Bieber Malware Spreading Across The Web

We all have different opinions on the Justin Bieber phenomenon, but there is no denying his star-power and influence over the younger generation. The Canadian star is constantly in the headlines for the wrong reasons, including a DUI arrest last week. Interestingly, this event has deeply affected information security worldwide.

Read More ›

NSA Uses Angry Birds, Google Maps, & Other ‘Leaky’ Apps To Spy

We’re already well-informed of just how far-reaching the NSA’s data-tapping techniques are, but newly published leaks have taught us more methods to the NSA-madness. According to new documents furnished by Edward Snowden, the NSA and British-counterpart GCHQ have been tapping into commercial data troves collected by popular smartphone apps like Angry Birds and Google Maps

Read More ›

Botnet Alert: Your Refrigerator May Be Infected

The “smart” home appliances we all are letting into our lives are getting “smarter”. This isn’t a movie plot, nor is it a scientific experiment. Security provider Proofpoint estimates that over 750,000 phishing and spam emails have already been sent out by infected fridges, televisions and other appliances.

Read More ›

Google Turns Deaf Ear to Speech Recognition Exploit in Chrome

Each new technology seems to emerge together with exploitable baggage. Speech recognition, for example, is being used in rising technologies from Siri to smart homes and is evolving quickly. While speech recognition has the potential to make life much easier and quicker, like any technology it comes with flaws. In this case, a Chrome browser exploit

Read More ›

Preparing the Cyber-Cops of Tomorrow: Interview with Giovanni Vigna

Each year, hundreds of hackers gather in computer labs around the world. Their goal? Like any other hackers, their goal is to manually exploit application and network level flaws in servers across the globe. If it sounds malicious, it’s just because it mimics real world vulnerability exploitations that happen every day. In fact, this specific

Read More ›

Jump to Category