Tag : Privacy Violation

Identity Theft

All You Wanted To Know About Identity Theft

Aug 05, 2015 By Sharon Solomon | With the internet revolution in full swing, web and mobile applications are extracting more and more private information from us. While this is definitely making life easier and enhancing our productivity, large databases of Personally Identifiable Information (PII) are left exposed due to lack of security awareness and/or vulnerable applications. Identity Theft has become a common occurrence in today’s cyberspace, making it important for organizations to understand the nature of the risks and eliminate them before it’s too late.

</Read More>
Internet of Things

Internet of Things (IoT): Hack My Ride

Jul 15, 2015 By Sharon Solomon | Automobiles have come a long way since they were introduced to the masses at the beginning of the 20th century. Once measured by the roar of their engines and the comfort of their seats, today’s cars have metamorphosed into interactive computers on wheels. With the Internet of Things (IoT) phenomenon now taking the world by storm, a wide range of vulnerabilities are being exposed on today’s advanced automobiles. So what is the security situation right now and what can be done to ensure automotive safety going ahead?  

</Read More>
iStock_000018034077Small-210x300

Google Turns Deaf Ear to Speech Recognition Exploit in Chrome

Jan 23, 2014 By Sarah Vonnegut | Each new technology seems to emerge together with exploitable baggage. Speech recognition, for example, is being used in rising technologies from Siri to smart homes and is evolving quickly. While speech recognition has the potential to make life much easier and quicker, like any technology it comes with flaws. In this case, a Chrome browser exploit involving Google’s speech recognition technology that was discovered and reported to Google and has yet to be fixed.

</Read More>
iStock_000021183339XSmall

Facebook Can Track Every Letter You Type, Posted Or Not

Dec 18, 2013 By Sharon Solomon | The “blue and white” Facebook logo is arguably the most familiar graphic in today’s cyberspace. Almost one out of every nine people in the world has an active Facebook account. This social media giant definitely makes the world smaller place, but not without seriously compromising the user’s security and privacy.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.