Introducing Checkmarx Software Composition Analysis (CxSCA)

Checkmarx Blog

Smart Bulb Offers Light, Color, Music, and... Data Exfiltration?

Smart Bulb Offers Light, Color, Music, and… Data Exfiltration?

Smart bulbs are widely known as a successful offering in home automation and IoT products, as they are internet-capable light bulbs that allow home users to customize the colors, schedule on and off times, and control them remotely. Some even play music and could improve your sleep. Any device that can wireless connect with phone

Read More ›

Navigation Apps: Leading the Way? Or Following You?

Navigation Apps: Leading the Way? Or Following You?

In the United States alone, 84% of adults are using navigation applications, according to a recent Gallup poll. Whether they’re downloading it in an app store or the navigation capability is already built into the car, these navigation tools are taking us to the grocery store, to our grandparents’ house, to job interviews, and everywhere

Read More ›

Cyber Security Workshop: Stronger Together

Cyber Security Workshop: Stronger Together

Last week at Checkmarx we hosted an official delegation from Thüringen, Germany for a Cyber Security workshop organized by Checkmarx, AHK Israel, and LEG Thüringen, the State Development Corporation, under the theme “Stronger Together.” The workshop was designed to serve as a knowledge exchange platform between all participating parties from Israel and Germany, at all

Read More ›

How can you get more from your AppSec education program

How Can You Get More from Your AppSec Education Program?

Forbes recently published an article titled “The Cybersecurity Talent Gap Is An Industry Crisis” – and without question, there’s a real lack of cybersecurity talent. Cybersecurity Ventures predicts about 3.5 million unfilled cybersecurity job openings by 2021! The need for cybersec talent is undeniable. According to Gemalto, data breaches compromised 4.5 billion records in just

Read More ›

Managing Software Security 10 Essential Best Practices [Infographic]

Managing Software Security: 10 Essential Best Practices [Infographic]

Is your software security program up to the challenges of a rapidly accelerating software delivery environment? Most aren’t – and it’s challenging to both identify the problems and determine the best ways to manage software security in a DevOps environment. Learn some of the essential best practices for managing software security now. Educate Your Team

Read More ›

(More) Common Security Mistakes when Developing Swift Apps - Part II

(More) Common Security Mistakes when Developing Swift Apps – Part II

In my post last week I shared common security mistakes developers make when building Swift applications – covering insecure data storage, symmetric key algorithms, insecure communication and more. If you haven’t read it, please take a few minutes to review this information. It’s critical to understand these mistakes as well as the ones I’m sharing

Read More ›

Learn JavaScript History with this Infographic | Checkmarx

The History of JavaScript [INFOGRAPHIC]

Brendan Eich, a Netscape Communications Corporation programmer, created JavaScript in September 1995. It took Eich only 10 days to develop the scripting language, then known as Mocha.Let’s step back to look at this complex JavaScript history. Why Put the Java in JavaScript? When Eich created JavaScript in 1995, he created it for Netscape Navigator and

Read More ›

Common Security Mistakes when Developing Swift Applications – Part I

Common Security Mistakes when Developing Swift Applications – Part I

Overview: Data Storage and Communication Security Swift was first introduced in 2014 at Apple’s Worldwide Developers Conference (WWDC) as the iOS, macOS, watchOS and tvOS de facto programming language. Designed by Chris Lattner and many others at Apple Inc., Swift is a general-purpose, multi-paradigm, compiled programming language. Although first released as a proprietary programming language, version

Read More ›

Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Meet NFCdrip – a New Security Concern for Air-Gapped Systems

Air-gapping means physically isolating a secure computer from unsecured networks, such as the public Internet or an unsecured local area network. The concept of air-gapping represents just about the maximum protection one network can have from another, other than actually turning off the device. Typically, military or governmental computer systems, financial computer systems, industrial control

Read More ›

10 Tips to Take Control of Your Public Wi-Fi Security

10 Tips to Take Control of Your Public Wi-Fi Security

The amazing ability to surf from anywhere sometimes distracts us from a very basic fact: the information may flow to us – but it can flow from us, in other, undesirable directions.So whether you are on your way to a vacation in a city that offers public Wi-Fi or you live in a city that

Read More ›

Jump to Category