Please turn on your JavaScript for this page to function normally.
Guide for the Secure Software Development Lifecycle

(ISC)2 released of the “Official (ISC)2 Guide to the CSSLP“, a textbook that serves as the only official guide to the Certified Secure Software Lifecycle …

2011 CWE/SANS top 25 most dangerous software errors

SANS and Mitre have released the CWE/SANS Top 25 Most Dangerous Software Errors list for 2011. The list was compiled with the help of a great number of security experts from a …

Android URL Filtering SDK: Secure Web browsing and compliance

Commtouch announced GlobalView URL Filtering for Mobile, which enables real-time protection for mobile device users browsing the Web. GlobalView URL Filtering is comprised of …

Randomization of code and binaries for evading AV solutions

An interesting detection evasion technique by a site that serves fake AV has recently been spotted by a Zscaler researcher. The site’s source code has been randomized so …

OpenBSD headman believes contractor tried to insert backdoors

Following last week’s accusation by a former government contractor that the FBI has implemented backdoors into the encryption software used by OpenBSD, Theo de Raadt, …

New book: Managed Code Rootkits

Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when …

Don't miss

Cybersecurity news