programming
Commercial code is more compliant to security standards than open source code
A new report details the analysis of nearly 10 billion lines of source code through the Coverity Scan service and usage of the Synopsys Coverity Software Testing Platform.For …
One in 600 websites exposes sensitive info via easily accessible .git folder
Git is the most popular tool for software version control out there. Created by Linus Torvalds to facilitate Linux kernel development, Git is a boon for software developers as …
Researchers eliminate coding errors by using good code from “donor” apps
The main appeal of open source software is in the fact that its source code can be reviewed by anyone and, theoretically, stealthy backdoors and unintentional errors should be …
Why WinSCP became an open source classic
If you’re a Windows user and you’re connecting securely to remote machines, you’ve probably heard about WinSCP. This multi-functional open source tool has …
The enduring chasm between security teams and developers
The gap between application builders (developers and development organizations) and defenders (security and operations teams responsible for securing apps) is closing …
Do smart machines require ethical programming?
Realizing the potential of smart machines — and ensuring successful outcomes for the businesses that rely on them — will hinge on how trusted smart machines are and how well …
How GitHub is redefining software development
The security industry is slowly realizing what the developer community knew for years – collaboration is the key to and likely the future of innovation. Even if …
Four cyber security risks not to be taken for granted
It’s pretty difficult to make information security predictions, and even more difficult to verify them afterwards: we can only judge the effectiveness of information …
The hidden dangers of third party code in free apps
Research from MWR InfoSecurity has shown the various ways hackers can abuse ad networks by exploiting vulnerabilities in free mobile apps. When people install and use free …
Python Forensics
Author: Chet Hosmer Pages: 352 Publisher: Syngress ISBN: 0124186769 Introduction This book was touted as a “no-nonsense resource for the rapid development of new …
Software security in a market for lemons
There is little doubt that it’s difficult to develop secure software. First, you need to be aware of the need for security, accepting it as an important element of …
10 most significant software security design flaws
The IEEE Center for Secure Design, a cybersecurity initiative focused on the identification of software design flaws, released a report based on real-world data collected and …
Featured news
Sponsored
Don't miss
- How much does cloud-based identity expand your attack surface?
- Finding software flaws early in the development process provides ROI
- Zero-day exploitation surged in 2023, Google finds
- NHS Scotland confirms ransomware attackers leaked patients’ data
- Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)