Tag : Application Security

What’s HOT in Application Security Vol #16

Jun 18, 2012 By Administrator | WHMCS still vulnerable after latest string of attacks
WHMCS is a UK supplier of technical support and customer service is yet again the victim of a Ddos attack, due to its inability to mend an already known SQL Injection vulnerability. The embarrassment continued for the company in the days following where a hacker was auctioning the rights to abuse the weakness using an underground forum.

</Read More>

What’s HOT in Application Security Vol #15

Jun 11, 2012 By Administrator | 5 of the most famous hacks, ever! 
Hacking has pretty much been a concept which has been around since as long as the internet has. Sometimes the criminals go after governments to make political statements, like the recent hacks seen against the Chinese Government, sometimes it’s all about an online cyber war, as was seen in the Israel vs Iran Stuxnet fiasco or hacking is the result of pure and simple financial gain, as was seen in the recent Sony breach.

</Read More>
239px-SDLC_-_Software_Development_Life_Cycle-resized-600

Coding Security Into Applications – Secure SDLC

Jun 04, 2012 By Administrator | We wanted to share with you an excellent article written by Richard Janezic from midsizeinsider.com that covers the alarming state of application security, and how many of the current security vulnerabilities can be prevented by dedicating more thought into developing a secure coding methodology utilizing technologies that are available in the marketplace and considerably reduce the complexity of the task at hand.

</Read More>
Application-Security-News-Thumbnail

What’s HOT In Application Security Vol #14

Jun 04, 2012 By Administrator | Are Chinese Hackers threatening the US economy using malware?
According to a McClatchy-Tribune report this month “Chinese attempts to collect U.S. technological and economic information will continue at a high level and will represent a growing and persistent threat to U.S. economic security.” The FBI, Department of Homeland Security and the Justice Department’s national security division have raised concerns in granting an international service license to China Mobile, making it easier for China to spy on the U.S. or steal intellectual property from U.S. companies.

</Read More>
flame

Flame Burns Right Through Windows Application Security

May 30, 2012 By Administrator | This week the cyber warfare stakes in the Middle East were raised a few notches when a Kaspersky Lab (Link) anti-virus expert discovered the Flame virus, which many have dubbed the most advanced and sophisticated cyber weapon ever unleashed. The Flame espionage worm, a previously unknown piece of malware was at the heart of a campaign to delete classified information from computers throughout the Middle East.

</Read More>
android-security-ITPromate-resized-600

Top 5 Apps to Keep Your Android Secure

May 23, 2012 By Administrator | Securing your data in an increasingly insecure world is no easy task. Backing up computer data,installing software that protects you from identity theft are just a few things we do to secure our data.  Think about it. Why wouldn’t you want to protect your Android Phone? It’s not only if you physically lose your phone with ALL the data on it. The pictures, emails, contacts, text messages, music, video. You all know that data is not so secure even when the phone is sitting in the palm of your hand. Below, we explore this security issue with real – life examples and give a few recommendations on apps to protect the data you need.  At work. In life.

</Read More>

What’s HOT in Application Security Vol#13

May 21, 2012 By Administrator | The High Price of Web Application Security 
What is the true cost of web application security? One CISO might say ‘My entire security solution cost me $40,000’, another might quote a higher price but many companies will simply answer ‘What is the cost of no application security?’

</Read More>

What’s HOT in Application Security Vol#12

May 14, 2012 By Administrator | 90% of all Custom Built Web Application are Wide Open for Attacks!
An astounding 86% of custom built websites are said to have vulnerabilities, said a report issued last week by an American IT company. Nearly 90% of all custom designed web applications tested found positive SQL Injection leaks.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.