Application Security

Application Security | News, how-tos, features, reviews, and videos

A rusty old lock hangs open amid the flow of binary code.
conference / convention / audience / applause / clapping

COVID-19 contact tracing app

4 critical issues surrounding contact-tracing apps

As countries rush to release contact-tracing apps, experts fear a lack of security and privacy controls.

Number six, painted on a door with a lock with abstract overlay of digital containers.

6 common container security mistakes to avoid

Containers are a secure way to deploy applications and services, but only if you use them properly. Here's how.

Binary code / magnifying lens / inspection / analysis

Make simple software security checks part of your purchasing process

A few hours of due diligence when evaluating software for purchase is cheaper than incident response clean up.

sucessfully transitioning to devsecops

Devsecops gains momentum in Australia

Tools, vendors, and prior knowledge aplenty as government ‘sprint teams’ coach Australian agencies on secure application development.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

Cryptojacking  >  Binary skull, code and bitcoin symbols invade systems as malware

RubyGems typosquatting attack hits Ruby developers with trojanized packages

Attacker targeted Windows systems to hijack cryptocurrency transactions, and was able to evade anti-typosquatting measures.

coding / programming / development / binary code

Review: How ShiftLeft catches vulnerabilities during code development

This combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process.

A glowing lightbulb stands out from the crowd of unlit lightbulbs.

RSA 2020: 7 trends and takeaways

Attendance down, costs up, and lots of tech talk

IDG Tech Spotlight  >  Containers + Virtualization [ CSO / March 2020 ]

How Visa built its own container security solution

The homegrown solution takes advantage of the native capabilities that already exist on container orchestration platforms and is primarily built on top of open-source tools and libraries.

Many keys, one lock  >  Brute-force credential stuffing.

APIs are becoming a major target for credential stuffing attacks

New research shows that attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable.

RSA 2020's hot new startups

12 hottest new cybersecurity startups at RSA 2020

Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. These are some of the more interesting startups coming out of stealth.

budget piggy bank spending savings security spending

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities.

IDG Tech Spotlight  >  Security  >  Cybersecurity in 2020: From secure code to defense in depth

Cybersecurity in 2020: From secure code to defense in depth

CIO, Computerworld, CSO, InfoWorld, and Network World tackle the hot security issues, from prioritizing risk to securing digital transformation.

Overflow  >  Pouring more binary water into a glass than it can hold causing overflow.

What is a buffer overflow? And how hackers exploit these vulnerabilities

A buffer overflow or overrun is a memory safety issue where a program does not properly check the boundaries of an allocated fixed-length memory buffer and writes more data than it can hold. This causes data to overflow to adjacent...

mobile security / threat detection / traffic analysis

Inspecting TLS-encrypted traffic with mitmproxy

The free, open-source mitmproxy tool makes it easy to inspect TLS-encrypted app and web traffic to see exactly who your phone is talking to.

tools / toolkit / binary code

9 top fuzzing tools: Finding the weirdest application errors

Fuzz testing tools root out odd programming errors that might result in dangerous unexpected application errors that attackers can exploit.

Secure-printing innovator Datasec targets rapid overseas expansion after scoring HP Workpath coup

Labor attacks “broken promises” around encryption laws but Melbourne developers report no concerns from overseas customers

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

8 common pen testing mistakes and how to avoid them

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them.

Load More