Tag : Vulnerability


Top 5 Apps to Keep Your Android Secure

May 23, 2012 By Administrator | Securing your data in an increasingly insecure world is no easy task. Backing up computer data,installing software that protects you from identity theft are just a few things we do to secure our data.  Think about it. Why wouldn’t you want to protect your Android Phone? It’s not only if you physically lose your phone with ALL the data on it. The pictures, emails, contacts, text messages, music, video. You all know that data is not so secure even when the phone is sitting in the palm of your hand. Below, we explore this security issue with real – life examples and give a few recommendations on apps to protect the data you need.  At work. In life.

</Read More>

What’s Hot in Application Security Vol #11

May 09, 2012 By Administrator | Is fear in the Cloud misplaced?
Who’s afraid of the big bad cloud? Everyone apparently! Corporations, Public Companies; the list is endless. Cloud Security is synonymous with problems. When we consider Cloud Security we think about application security and guarding sensitive data. Cloud Security has been one of the things on the front of the minds of IT directors for years as they ponder; how do we migrate data out of the corporate data centers to the cloud?

</Read More>

3 Most Common Phishing Scams

May 03, 2012 By Administrator | A recent report by the Securities and Exchange Commission (www.sec.gov), indicates that phishing is on the rise. In fact, phishing is the kind of cybercrime an average user is most likely to encounter on a day-to-day basis. Phishing attacks rely on human vulnerabilities, making them more difficult to defend against when compared to viruses, for example. Although modern browsers and security suites incorporate anti-phishing technologies, it still pays to be aware of the most common phishing scams.

</Read More>

What’s HOT in Application Security Vol#10

Apr 30, 2012 By Administrator | What’s Wrong with the Public Sector?
They’re failing OWASP Top 10!  
OWAP Top 10- the bible of web applicaiton vulnerabilties, the benchmark vulnerabilities by which most organizations should by going by; who’s their worst pupil? The Public Sector.

</Read More>

Whats HOT in Application Security Vol #9

Apr 24, 2012 By Administrator | Lady Gaga keeps her poker face in light of SQL Injection!
Lady Gaga’s website had a ‘Bad Romance’ with an SQL Injection attack, revealing the personal details of thousands of fans! The hack was reported more than six months ago and was committed by a group of hackers going under the pseudoname ‘SwagSec’. Even though the hackers never actually published the personal information of the fans, it is a major embarrassment for Lady Gaga’s team.

</Read More>

What’s HOT in Application Security Vol #8

Apr 16, 2012 By Administrator | Would you Trade your freedom for Application Security?
OWASP’s Dan Greer recently gave the keynote speech at the “Application Security Matters’ conference where he delved into the problems and issues arising from the inconsistencies in application security. There are many things which contribute to lousy application security- not taking the necessary steps to protect your code, protect your data and poorly written and bloated code. What can one do about it?

</Read More>

Webinar Recording: The Business Value of Partial Code Scanning

Mar 29, 2012 By Administrator | We are pleased to present you with the recording of the latest webinar that was held on the 22nd of March. The webinar was presented by: Kevin Beaver of Principle Logic (http://www.principlelogic.com/)
Maty Siman – Foudner & CTO of Checkmarx (https://www.checkmarx.com)

</Read More>

Top 5 Cyber Threats to Businesses

Mar 28, 2012 By Administrator | According to FBI Director Robert Mueller, cyber-crime is on track to
surpass terrorism as the most serious security threat in the United States. Businesses in particular face an increasing risk of exposing themselves to cyber-attacks. Here is a list of the top five cyber threats that threaten businesses today.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.