Tag : Google

iStock_000012268428Small-300x212

Cache of 2 Million Account Details For Facebook, Google, Yahoo Users Discovered

Dec 05, 2013 By Sarah Vonnegut | Some two million accounts on several of the most widely visited social media networks, email providers and websites were just discovered on a server with a bogus IP in the Netherlands. Hackers stole login usernames and passwords for Facebook, LinkedIn, Google, Twitter and various other popular sites.

</Read More>
sec-logo-securities-and-exchange-commission-s

What’s HOT in Application Security Vol #35

Nov 09, 2012 By asaphs | Securities and Exchanges Commission leaves sensitive data vulnerable to hackers 
Staff of the Securities and Exchanges Commission (SEC) have left highly sensitive information from exchanges open to hacking and other cyber attacks because they miserably and negligently failed to secure their data  and devices to the required standards. This statement came after inside information was leaked to the News Agency Reuters.

</Read More>
hitbmalaysia

What’s HOT in Application Security Vol#31

Oct 09, 2012 By asaphs | This Year’s Hack In The Box Conference To Hold Big Hitters In The Web Application Security World
This year’s famous Hack In The Box security conference is being held in Kuala Lumpur. Among the interesting events, Google will be hosting its Pwnium competition which first debuted at the CanSecWest security conference in March in Vancouver, British Columbia.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.