Tag: Application Security

Webinar Recording: The Business Value of Partial Code Scanning

We are pleased to present you with the recording of the latest webinar that was held on the 22nd of March. The webinar was presented by: Kevin Beaver of Principle Logic (http://www.principlelogic.com/) Maty Siman – Foudner & CTO of Checkmarx (https://www.checkmarx.com)

Read More ›

Top 5 Cyber Threats to Businesses

According to FBI Director Robert Mueller, cyber-crime is on track to surpass terrorism as the most serious security threat in the United States. Businesses in particular face an increasing risk of exposing themselves to cyber-attacks. Here is a list of the top five cyber threats that threaten businesses today.

Read More ›

What’s HOT in Application Security Vol#6

Application Security- Not Sufficient! A study was recently conducted among 800 It executives which found that there is a huge difference between the perception of Security from the viewpoint of the developer and security professionals. Security professionals view the applications in a far more optimistic light- stating that they are secure enough, whilst developers say

Read More ›

What’s HOT in Application Security Vol #3

Let’s understand the web application security dilemma! Organizations within the financial services industry track an average of 800 attacks, organizations out with the financial services industry track an average of 500 attacks- no wonder it’s so vital to understand application security. It’s said that the security challenge is due to the fact that most of

Read More ›

What’s HOT in Application Security Vol #1

Hackers in China accused of a long term breach of Nortel For almost ten years Chinese hackers gained complete access to the internal network of Nortel Networks, Ltd. Nortel was previously considered to be a telecommunications power house but has been struggling financially in recent years. The hackers stole several passwords from top Nortel executives

Read More ›

Path Manipulation, Directory Traversal, and interesting JAVA code

Directory Traversal Attacks Directory Traversal (CWE: 22) is usually considered a subset of Path Manipulation (CWE: 73). Directory Traversal, also referred to as Path Traversal,  attacks occur by manipulating variables with the ‘../’ (dot-dot-slash is another name this attack sometimes goes by) sequences, and attempt to access directories and files stored in a system. Path Directory

Read More ›

Jump to Category