Security teams need to be able to differentiate between inconsequential and truly damaging malware so resources aren't diverted towards chasing the wrong threat, says Cyphort's Shel Sharma
Application security, web app security, secure code development and software vulnerabilities
Company refused to pay $300 ransom before being hit with attack
Attackers have used a variety of techniques to exploit known vulnerabilities in router models from different manufacturers
Three quarters of vulnerabilities in third-party software
Developers will need to present compelling arguments for getting their plug-ins on the whitelist, Mozilla said
Windows XP still reigns as the most popular PC OS in the nation
It's no secret that users have to give up private information to use mobile apps. But given that attacks on mobile devices are on the rise, should they?
Malware designed to steal digital currency from Windows PCs has risen with Bitcoin value since beginning of last year, says study
Researchers signed an open letter outlining 10 transparency principles for companies to regain user trust following surveillance revelations
Still hungry? Here are links to application security books, associations, and other information resources to help you find (and avoid) vulnerabilities and build secure software and websites.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws by Dafydd Stuttard (2011). On Amazon.com.
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them by Michael Howard (2010). On Amazon.com
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition by Allen Harper (2011). On Amazon.com.
OWASP, the Open Web Application Security Project.
BSIMM, the Building Security In Maturity Model.
Also see Application and software security certifications in CSOonline's Security Certification Directory.