programming
Guide for the Secure Software Development Lifecycle
(ISC)2 released of the “Official (ISC)2 Guide to the CSSLP“, a textbook that serves as the only official guide to the Certified Secure Software Lifecycle …
2011 CWE/SANS top 25 most dangerous software errors
SANS and Mitre have released the CWE/SANS Top 25 Most Dangerous Software Errors list for 2011. The list was compiled with the help of a great number of security experts from a …
Android URL Filtering SDK: Secure Web browsing and compliance
Commtouch announced GlobalView URL Filtering for Mobile, which enables real-time protection for mobile device users browsing the Web. GlobalView URL Filtering is comprised of …
Randomization of code and binaries for evading AV solutions
An interesting detection evasion technique by a site that serves fake AV has recently been spotted by a Zscaler researcher. The site’s source code has been randomized so …
OpenBSD headman believes contractor tried to insert backdoors
Following last week’s accusation by a former government contractor that the FBI has implemented backdoors into the encryption software used by OpenBSD, Theo de Raadt, …
New book: Managed Code Rootkits
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity