Application Security

Application Security news, information, and how-to advice

tim cook apple music

A real bug on a computer monitor full of code

MIT tests 'software transplants' to fix buggy code

Like visiting a junk yard to find cheap parts for an aging vehicle, researchers from the Massachusetts Institute of Technology have come up with a way to fix buggy software by inserting working code from another program.

FTC website

FTC settles with developers of sneaky cryptocurrency mining app

The developers of a mobile app called Prized that secretly mined cryptocurrencies on people's mobile phones have settled with the U.S. Federal Trade Commission after being accused of deceptive trade practices.

software development

Government ranks last in fixing software security holes

Three-quarters of all government Web and mobile applications fail their initial security reviews, making it the worst-performing vertical -- and government agencies are also the slowest at fixing vulnerabilities.

uss fort worth bridge

The US Navy's warfare systems command just paid millions to stay on Windows XP

The U.S. Navy is paying Microsoft millions of dollars to keep up to 100,000 computers afloat because it has yet to transition away from Windows XP. They've signed a US$9.1 million contract earlier this month for continued access to...

rx drugs thinkstock

Akorn Inc. has customer database stolen, records offered to highest bidder

Akorn Inc., a niche pharmaceutical company Lake Forest, IL, has had a customer database with more than 50,000 records compromised by hackers who are offering to sell the data to the highest bidder or back to the company, whichever...

apple watch pay

Mobile security: the coming battle of hardware versus software

According to security experts, there are several paths forward for mobile payments, each with its own security implications


LastPass compromise: Here's what you need to know and what you can do

On Monday, LastPass informed customers about an attack that took place on Friday, which compromised password data. However, before you panic, here's what you need to know and what you can do to stay safe.

flashlight darkness

Windows 10 will allow apps to actively scan their content for malware

Developers will be able to have their apps talk to the locally installed antivirus programs through a new API

icloud rain

Apple Mail flaw could pose risk to iCloud passwords

A researcher says he notified Apple in January but the flaw has yet to be patched


SweetCAPTCHA users complain of advertising pop-ups

A script inside the CAPTCHA tool is displaying pop-ups, which could lead to harmful software

hitching ride

A CSO explains how to reduce risk by improving user experience

Peter Hesse shares how techniques used during development reveal a pathway to reduce risk while improving experience

radiology tomography

Attackers targeting medical devices to bypass hospital security

A report from TrapX Labs highlights three successful attacks against healthcare organizations. The incidents prove that defending assets in a healthcare environment isn't as easy as some would have you think.

iceberg underwater

Security startup finds stolen data on the 'Dark Web'

Terbium uses data fingerprinting techniques to find stolen information on the Web

Servers at laas fdls

Researchers discover hidden shell in Hola VPN software

Hola pushed software updates out to users over the weekend, but they do not fix the vulnerabilities disclosed last week by researchers. On Monday, researchers released new details about the Hola VPN client based on their examination...

tunnel gate entrance

Hola VPN client vulnerabilities put millions of users at risk

Hola, an Israeli company that develops a browser plug-in promoted heavily as a means to bypass region locks on Web-based content and anonymous surfing, has several critical vulnerabilities that put users at risk, researchers warn.

A fly using a walker

11 software bugs that took way too long to meet their maker

All software has bugs, but even the most well known applications can have errors and vulnerabilities that somehow go undetected for years - or decades.

bending over backwards

Agile security lessons from Aetna and the state of Texas

The move to agile development practices poses both challenges and opportunities to security teams -- with the challenges often dominating. But some organizations have found ways to make it work. What is agile security? And how can you...

sexy spy

Adult Friend Finder confirms data breach 3.5 million records exposed

Internet hook-up destination, Adult Friend Finder, boasts more than 60 million members worldwide. Unfortunately, at least three million of them have had their accounts compromised after a Thai hacker sought revenge.

Load More