Please turn on your JavaScript for this page to function normally.
code
Connected devices riddled with badly-coded APIs, poor encryption

The advent of home automation and rapid rise of smart home connected devices is seeing some vendors and new startups scramble to become a part of the movement, with ABI …

linux tux
Linux kernel development: How fast it’s going and who is doing it

The Linux Foundation analyzed the work done by over 13,500 developers over more than a decade, to provide insight into the Linux kernel development trends and methodologies …

Keyboard
Build serverless, secure apps in the cloud

Swirlds released the SDK for the hashgraph distributed consensus platform, which is free for download (the registration fields are optional). This software development …

code
Flawed code hooking engines open endpoints to compromise

Six common security issues stemming from the incorrect implementation of code hooking and injection techniques have been unearthed by EnSilo researchers in over 15 different …

terminal
Microsoft creates Checked C extension to prevent common coding errors

Fixing vulnerabilities in completed software and systems is all good and well, but with Checked C, an extension for the C programming language, Microsoft researchers want to …

Hands
How programmers can be tricked into running bad code

Are programming language package managers vulnerable to typosquatting attacks? And can these attacks result in software developers running potentially malicious code? The …

connection
Improving software security through a data-driven security model

The current software security models, policies, mechanisms, and means of assurance are a relic of the times when software began being developed, and have not evolved along …

Hands
OWASP set to address API security risks

OWASP has started a new project and is set to publish a new guide on security risks. The issue they aim to tackle this time is API security. The new OWASP API Security Project …

Laptop
How developers fight the rise in web application attacks

Recent reports highlight the challenge faced by developers in securing code as attacks against web applications increase, while security budgets for developers remain low, …

Keyboard
Build security design principles into cyber-physical systems

We are immersed in a cyber-physical world. Information technology is deeply embedded in traditionally non-IT systems, including automobiles, the electric grid and emergency …

Healthcare
Developing a mobile health app? Check which federal laws apply

The Federal Trade Commission has created a new web-based tool for mobile health app developers, which is designed to help the developers understand what federal laws and …

Security
PHP, Python still fail to spot revoked TLS certificates

In 2012, a group of researchers demonstrated that SSL certificate validation is broken in many applications and libraries, and pointed out the root causes for that situation: …

Don't miss

Cybersecurity news