Application Security

OWASP Top 10 released for 2013

OWASP Top 10 released for 2013

By

Injection, broken authentication/session management and cross-site scripting make up the top three spots.

Product opener: It's all about the data

Product opener: It's all about the data

By

The old notions of defense-in-depth are being challenged, and architectures tend to have what appear to be single points of failure or compromise.

Needed: Better app control

Needed: Better app control

Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.

Black Hat hacker con promises to "ruffle some feathers"

By

The chairs of the five conference tracks taking place later this month at the Black Hat show in Las Vegas took some time Thursday to discuss some of the more riveting sessions that are planned.

Malicious Android application loots bank login data

By

Criminals are lessening their reliance on the PC. The latest proof is a rogue Android application that seeks to steal Spanish banking credentials through a man-in-the-middle-style attack.

Case study: An educated decision

Case study: An educated decision

By

Web applications remain a primary vector for attack, and the higher education space remains fertile ground for successful breaches. That's why West Virginia University wanted to take a proactive approach.

Code surety: Secure by design

Code surety: Secure by design

More-than-decade-old bugs still plague web applications, and the challenge is only growing for programs migrating to the cloud. But new frameworks and heightened awareness can mitigate the threat.

Juniper Networks acquires Mykonos Software

By

Juniper Networks has acquired Mykonos Software, a privately held company which offers tools and services to secure websites and web applications against hackers.

Google Wallets app flaw could lead to compromise

By

Google has temporarily disabled the creation of prepaid payment cards while it investigates two security flaws in Google Wallet accounts on Android phones.

An educated decision: Network smarts at WVU

An educated decision: Network smarts at WVU

By

West Virginia University was looking to protect student and staff data. It found a software solution to assist in the process, reports Greg Masters.

Keep taking the tablets...

Taking your Android's pulse before you give it access to your health records.

New Java exploit one of many impacting firms

By

A new exploit, which has made its way into the Metasploit framework, underscores the danger posed by Java vulnerabilities, which are responsible for many of today's enterprise malware threats.

Australian gov't wins U.S. security award from SANS

An Australian government agency that instituted patching, whitelisting and account control as the foundation of its targeted attack defense took home a U.S. award from the SANS Institute.

Industry remembers security heavyweight Schultz

By

Gene Schultz, who died on Sunday at the age of 65, is remembered as one of the most accomplished and respected professionals in the field of cybersecurity.

Video: The "Bring Your Own Device" conundrum

By

SC Magazine Executive Editor Dan Kaplan sits down with a Juniper security executive to learn why the trend of mobility and data migration should be a top concern for security professionals, and how they can institute best practices to deal with the new risk.

Sponsored video: Tom Reilly of HP on security investment

By

SC Magazine Editor-in-Chief Illena Armstrong sits down with Tom Reilly, VP and general manager, HP Enterprise Security Products, to discuss how corporations' increased reliance on virtualization, applications and mobile devices create new surface areas for attack, and what CSOs must do to make the business case for information security and risk management funding.

Apple delivers iOS patch for jailbreak flaw

By

Apple on Friday issued an update for its iOS mobile operating system, addressing a security flaw being used to jailbreak iPad, iPhone and iPod Touch devices.

Apple readying fix for iOS flaw used to jailbreak devices

By

Apple on Thursday said it is working to fix a security flaw in its iOS mobile operating system that soon could be used by criminals to gain access to users' devices.

New iPad 2 jailbreak tool leverages iOS flaw

By

A new, web-based jailbreaking tool available for the iPad 2 leverages a vulnerability in the way Apple's mobile operating system, iOS, handles PDF files.

Smartphones safer than desktops, but not without risks

By

Apple's iOS and Google's Android mobile platforms are more secure than traditional desktop operating systems though both are still vulnerable to many types of attacks, according to a new report.

"LulzSec" uses zero-day on PBS, promises more attacks

By

There is a new cybervigilante group in town, and its name is LulzSec. Its technical ability became known over the weekend with the infiltration and subsequent defacement of PBS.org.

Debate: Mobile app stores should test and certify before making apps available to customers.

Debate: Mobile app stores should test and certify before making apps available to customers.

New report finds most applications don't pass security tests

By

A new report from Veracode paints a grim picture of the security built into application software.

Hackers breach Nasdaq; trading systems not affected

By

Nasdaq OMX, the company that runs the world's largest electronic stock exchange, said it detected suspicious files on its U.S. servers.

Web applications remain a pressing concern

By

Vulnerabilities in web applications remain the preferred entryway for crooks seeing valuable company information, Rob Lamb, vice president of IBM security products, said Wednesday at SC Congress Canada in Toronto.

Mobile application threat not here yet, but it's on the way

By

The mobile application threat space still is in its infancy, but organizations should be planning for the possibility of things heating up in the near future, said the security director of a major bank in Canada.

Defense in depth: building a holistic security infrastructure

Defense in depth: building a holistic security infrastructure

Organizations must consider security at the network, application, host and data layers to most effectively protect against threats.

Microsoft to issue ASP.net patch out of cycle on Tuesday

By

Microsoft on Tuesday will make available a patch for a zero-day vulnerability affecting ASP.net.

Microsoft confirms ASP.NET flaw, issues workaround

By

Microsoft late Friday issued a security advisory confirming the existence of an unpatched vulnerability that affects web applications built on ASP.NET.

Automated web attacks: Interview with Amichai Shulman, co-founder and CTO of Imperva

By

In a conversation with SC Magazine Deputy Editor Dan Kaplan, Amichai Shulman, co-founder and CTO of Imperva, introduces a new research initiative underway and addresses the automated methods now used by attackers to compromise legitimate websites.

Sign up to our newsletters

POLL