Email Alerts
-
Cross-build injection attacks: Keeping an eye on Web applications' open source components
Web application developers' growing dependence on open source components has opened the door for attackers to insert malicious code into applications even as they are being built. Michael Cobb explores the emerging attack method called cross-build in... Tip
-
How to avoid dangling pointers: Tiny programming errors leave serious security vulnerabilities
For years, many have said that there is no practical way to exploit a dangling pointer, a common application programming error. But these software bugs should no longer be thought of as simple quality-assurance problems. Michael Cobb explains how th... Tip
-
Dynamic code obfuscation: New threat requires innovative defenses
Dynamic code obfuscation used to be a taxing effort, but now even the most junior-level malicious hackers have learned how to effectively hide their code. In this tip, Michael Cobb examines how dynamic code obfuscation works, why it's on the rise and... Tip
-
Ten dos and don'ts for secure coding
Security practitioners should understand how developers introduce security vulnerabilities into applications and work to support the developers in improving code quality and security. Encouragement and support for improvement must be a fundamental pa... Tip
-
The methodology of software creation/distribution
Learn what steps companies must follow to ensure the software they create and distribute is secure. Tip
-
Checklist for building better software
Learn how to reduce the number of security vulnerabilities introduced to software during the development process. Tip
-
Microsoft tossing money away
In its pursuit of more secure software, Microsoft announces $1 million in grants to support development advances, but it's unlikely to make a difference. Tip
-
Security issues of using shared code
Security pros need to be aware of code that is being "borrowed" for custom applications. Tip
-
Mini-tutorial: The Java security model
Mike Chapple takes a look under the hood of Java. Tip
-
Source code security scanners: A revamped option for securing custom software
Software development teams are no longer limited to pen testing and manual code analysis for securing custom code. Tip
Security Management Strategies for the CIO