Application Security

OWASP Top 10 released for 2013

OWASP Top 10 released for 2013

By

Injection, broken authentication/session management and cross-site scripting make up the top three spots.

Product opener: It's all about the data

Product opener: It's all about the data

By

The old notions of defense-in-depth are being challenged, and architectures tend to have what appear to be single points of failure or compromise.

Needed: Better app control

Needed: Better app control

Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.

Black Hat hacker con promises to "ruffle some feathers"

By

The chairs of the five conference tracks taking place later this month at the Black Hat show in Las Vegas took some time Thursday to discuss some of the more riveting sessions that are planned.

Malicious Android application loots bank login data

By

Criminals are lessening their reliance on the PC. The latest proof is a rogue Android application that seeks to steal Spanish banking credentials through a man-in-the-middle-style attack.

Juniper Networks acquires Mykonos Software

By

Juniper Networks has acquired Mykonos Software, a privately held company which offers tools and services to secure websites and web applications against hackers.

An educated decision: Network smarts at WVU

An educated decision: Network smarts at WVU

By

West Virginia University was looking to protect student and staff data. It found a software solution to assist in the process, reports Greg Masters.

Keep taking the tablets...

Taking your Android's pulse before you give it access to your health records.

New Java exploit one of many impacting firms

By

A new exploit, which has made its way into the Metasploit framework, underscores the danger posed by Java vulnerabilities, which are responsible for many of today's enterprise malware threats.

Australian gov't wins U.S. security award from SANS

An Australian government agency that instituted patching, whitelisting and account control as the foundation of its targeted attack defense took home a U.S. award from the SANS Institute.

Industry remembers security heavyweight Schultz

By

Gene Schultz, who died on Sunday at the age of 65, is remembered as one of the most accomplished and respected professionals in the field of cybersecurity.

Video: The "Bring Your Own Device" conundrum

By

SC Magazine Executive Editor Dan Kaplan sits down with a Juniper security executive to learn why the trend of mobility and data migration should be a top concern for security professionals, and how they can institute best practices to deal with the new risk.

Sponsored video: Tom Reilly of HP on security investment

By

SC Magazine Editor-in-Chief Illena Armstrong sits down with Tom Reilly, VP and general manager, HP Enterprise Security Products, to discuss how corporations' increased reliance on virtualization, applications and mobile devices create new surface areas for attack, and what CSOs must do to make the business case for information security and risk management funding.

Apple delivers iOS patch for jailbreak flaw

By

Apple on Friday issued an update for its iOS mobile operating system, addressing a security flaw being used to jailbreak iPad, iPhone and iPod Touch devices.

Apple readying fix for iOS flaw used to jailbreak devices

By

Apple on Thursday said it is working to fix a security flaw in its iOS mobile operating system that soon could be used by criminals to gain access to users' devices.

New iPad 2 jailbreak tool leverages iOS flaw

By

A new, web-based jailbreaking tool available for the iPad 2 leverages a vulnerability in the way Apple's mobile operating system, iOS, handles PDF files.

Smartphones safer than desktops, but not without risks

By

Apple's iOS and Google's Android mobile platforms are more secure than traditional desktop operating systems though both are still vulnerable to many types of attacks, according to a new report.

"LulzSec" uses zero-day on PBS, promises more attacks

By

There is a new cybervigilante group in town, and its name is LulzSec. Its technical ability became known over the weekend with the infiltration and subsequent defacement of PBS.org.

Debate: Mobile app stores should test and certify before making apps available to customers.

Debate: Mobile app stores should test and certify before making apps available to customers.

New report finds most applications don't pass security tests

By

A new report from Veracode paints a grim picture of the security built into application software.

Hackers breach Nasdaq; trading systems not affected

By

Nasdaq OMX, the company that runs the world's largest electronic stock exchange, said it detected suspicious files on its U.S. servers.

Web applications remain a pressing concern

By

Vulnerabilities in web applications remain the preferred entryway for crooks seeing valuable company information, Rob Lamb, vice president of IBM security products, said Wednesday at SC Congress Canada in Toronto.

Mobile application threat not here yet, but it's on the way

By

The mobile application threat space still is in its infancy, but organizations should be planning for the possibility of things heating up in the near future, said the security director of a major bank in Canada.

Defense in depth: building a holistic security infrastructure

Defense in depth: building a holistic security infrastructure

Organizations must consider security at the network, application, host and data layers to most effectively protect against threats.

Microsoft to issue ASP.net patch out of cycle on Tuesday

By

Microsoft on Tuesday will make available a patch for a zero-day vulnerability affecting ASP.net.

Microsoft confirms ASP.NET flaw, issues workaround

By

Microsoft late Friday issued a security advisory confirming the existence of an unpatched vulnerability that affects web applications built on ASP.NET.

Automated web attacks: Interview with Amichai Shulman, co-founder and CTO of Imperva

By

In a conversation with SC Magazine Deputy Editor Dan Kaplan, Amichai Shulman, co-founder and CTO of Imperva, introduces a new research initiative underway and addresses the automated methods now used by attackers to compromise legitimate websites.

No reason to keep application security in the backseat

No reason to keep application security in the backseat

A computer expert draws on three case studies to dispel myths surrounding the protection and prevention of vulnerable code.

Microsoft releases new tool to defend against DLL attack

By

As Microsoft continues to probe the DLL "preloading" vulnerability, it released a "Fix It" that organizations can use to configure their applications from being open to attack.

Visa releases best practices for installing payment apps

By

Visa on Tuesday announced best practices for companies to use when implementing, installing and managing programs that process payment applications. The guidance will complement the existing Payment Application Data Security Standard (PA-DSS), which prescribes 14 requirements for software developers that build programs that process credit card payments. The Visa payment application best practices, developed in conjunction with the SANS Institute, include 10 guidelines and can be downloaded here. They are meant for vendors, integrators and resellers. — DK

Sign up to our newsletters

POLL