Please turn on your JavaScript for this page to function normally.
Risk across the phases of application security

A new Ponemon Institute study surveyed more than 800 IT Security and Development professionals from enterprise organizations to understand the perceptions both groups have …

Machine Learning for Hackers

If you’re an experienced programmer interested in crunching data, Machine Learning for Hackers will get you started with machine learning—a toolkit of algorithms that …

iOS 5 Programming Cookbook

Now you can overcome the vexing, real-life issues you confront when creating apps for the iPhone, iPad, or iPod Touch. By making use of more than 100 new recipes in this …

Programming Perl, 4th Edition

Adopted as the undisputed Perl bible soon after the first edition appeared in 1991, Programming Perl is still the go-to guide for this highly practical language. Perl began …

Comprehensive Java testing solution

Parasoft introduced a new release of Parasoft Jtest: a comprehensive Java testing solution that automates static analysis, unit testing, coverage analysis, runtime error …

Programmer steals US government software source code

A Chinese computer programmer has been arrested in New York for having allegedly copied and stolen the source code of software developed by the US Treasury Department, …

Reactions from the security community to the Trustworthy Computing Initiative

This week, Microsoft is celebrating 10 years of its Trustworthy Computing Initiative (TwC). One of the most well-known outcomes of Trustworthy Computing is the Microsoft …

10 years of Microsoft’s Trustworthy Computing Initiative

Ten years ago this week, during a time when security problems were threatening trust in software products, Bill Gates sent an email to all Microsoft full-time employees …

Smart network cloud application platform

NETGEAR announced its Smart Network Cloud Application Platform, a new technology platform that enables consumers to purchase and download apps from the cloud for their home …

Biometric technologies for Android

Neurotechnology announced their new line of embedded biometric technologies, including VeriFinger Embedded SDK for fingerprint biometrics, VeriLook Embedded SDK for face …

A Bug Hunter’s Diary

For individuals who make a living developing and maintaining software systems, finding bugs in their own code is almost a daily ritual. Working on software developing projects …

SDK advances face recognition for large surveillance systems

Neurotechnology announced VeriLook Surveillance 2.0, a SDK for biometric face identification using live video streams from single or multiple high-resolution digital …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools