programming
Guide for the Secure Software Development Lifecycle
(ISC)2 released of the “Official (ISC)2 Guide to the CSSLP“, a textbook that serves as the only official guide to the Certified Secure Software Lifecycle …
2011 CWE/SANS top 25 most dangerous software errors
SANS and Mitre have released the CWE/SANS Top 25 Most Dangerous Software Errors list for 2011. The list was compiled with the help of a great number of security experts from a …
Android URL Filtering SDK: Secure Web browsing and compliance
Commtouch announced GlobalView URL Filtering for Mobile, which enables real-time protection for mobile device users browsing the Web. GlobalView URL Filtering is comprised of …
Randomization of code and binaries for evading AV solutions
An interesting detection evasion technique by a site that serves fake AV has recently been spotted by a Zscaler researcher. The site’s source code has been randomized so …
OpenBSD headman believes contractor tried to insert backdoors
Following last week’s accusation by a former government contractor that the FBI has implemented backdoors into the encryption software used by OpenBSD, Theo de Raadt, …
New book: Managed Code Rootkits
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when …
Featured news
Resources
Don't miss
- Major vulnerabilities found in Google Looker, putting self-hosted deployments at risk
- Global Threat Map: Open-source real-time situational awareness platform
- How Secure by Design helps developers build secure software
- Why incident response breaks down when it matters most
- Russian hackers are exploiting recently patched Microsoft Office vulnerability (CVE-2026-21509)