Apple has improved its security in recent years, but is it enough?
Application security, web app security, secure code development and software vulnerabilities
An exploit for the SQL injection vulnerability has been publicly available for over a month, said security researchers from Sucuri
Security teams need to be able to differentiate between inconsequential and truly damaging malware so resources aren't diverted towards chasing the wrong threat, says Cyphort's Shel Sharma
Company refused to pay $300 ransom before being hit with attack
Attackers have used a variety of techniques to exploit known vulnerabilities in router models from different manufacturers
Three quarters of vulnerabilities in third-party software
Developers will need to present compelling arguments for getting their plug-ins on the whitelist, Mozilla said
Windows XP still reigns as the most popular PC OS in the nation
Still hungry? Here are links to application security books, associations, and other information resources to help you find (and avoid) vulnerabilities and build secure software and websites.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard (2011). On Amazon.com.
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them by Michael Howard (2010). On Amazon.com
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition by Allen Harper (2011). On Amazon.com.
OWASP, the Open Web Application Security Project.
BSIMM, the Building Security In Maturity Model.
Also see Application and software security certifications in CSOonline's Security Certification Directory.