BSIMM4: Secure development's measuring stick

Software Development Methodology

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • New algorithm promises to secure P2P content

    Three cryptographers have developed a secure P2P content distribution method without creating bottlenecks, and it could prove to be a significant breakthrough in the encryption arena. 

  • Sony rootkit uninstaller causes bigger threat

    Princeton researchers say a security hole that appears when users try to remove Sony's copy protection software presents an even greater risk than the original rootkit. 

  • Security Bytes: FTC cracks down on alleged spyware distributors

    Patches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion suffers... 

  • Review: Series of tools helps shore up faulty coding

    Secure Software's CodeAssure Suite is for programmers, not security engineers. But developers will benefit from its findings during product development. 

  • Reporter's Notebook: NYC 'controls the software industry'

    At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits. 

  • Powerful payloads: The evolution of exploit frameworks

    Attackers have new tools to launch faster, more powerful attacks. Contributor Ed Skoudis offers up some examples, some of which are very clever and very evil. 

  • Exploit code lurks following new Windows patches

    Windows IT managers work to apply critical fixes before exploit code that may have Zotob-like effects can harm vulnerable systems. 

  • trigraph

    A trigraph is a three-character replacement for a special or nonstandard character in a text file. 

  • bypass

    Bypass, in general, means either to go around something by an external route rather than going through it, or the means of accomplishing that feat. 

  • sandbox

    In general, a sandbox is an isolated computing environment used by software developers to test new programming code.