5 dev tools for better code security
5 dev tools for securing your codeImage by geralt via pixabayInformation security is of paramount importance these days, and there is no better place to start securing systems and data than in the...
View ArticleThree-year-old IBM patch for critical Java flaw is broken
Security researchers have found that a patch released by IBM three years ago for a critical vulnerability in its own Java implementation is ineffective and can be easily bypassed to exploit the flaw...
View ArticleOutdated Git version in OS X puts developers at risk
The OS X command line developer tools include an old version of the Git source code management system that exposes Mac users to remote code execution attacks. The Git client allows developers to...
View ArticleOracle security update includes Java, MySQL, Oracle Database fixes
Administrators who support Java applications and various Oracle databases should pay close attention to the latest quarterly security update from Oracle, as more than a third of the security fixes...
View ArticleJenkins 2 addresses ease and security, not scalability
Jenkins 2, an upgrade to the popular continuous integration and delivery platform for software development projects, will formally debut Tuesday with improvements to usability and security. But...
View ArticleBetter software testing through automation
Automated testing is an integral part of the continuous delivery pipeline. Despite its benefits, in reality most organizations still use outdated manual testing processes. In one survey by XBOsoft, an...
View ArticleJenkins security patches could break plug-ins
Popular open source automation server Jenkins has fixed multiple security vulnerabilities. The latest version changes how plug-ins use build parameters, though, so developers will need to adapt to the...
View ArticleNew JavaScript library brings Java to browsers without applets
Melding the worlds of Java and JavaScript, JavaPoly.js extends native Java Virtual Machine support to browsers via a library serving as a polyfill. JavaPoly.js enables developers to import existing...
View ArticleJS email attachments may carry potent ransomware
Attackers are infecting computers with a new ransomware program called RAA that's written entirely in JavaScript and locks users' files by using strong encryption. Most malware programs for Windows...
View ArticleSevere flaws in widely used archive library put many projects at risk
In a world where any new software project is built in large part on existing third-party code, finding and patching vulnerabilities in popular open-source libraries is vital to creating reliable and...
View ArticleJeremiah Grossman: Focus on ransomware, SDLC, and endpoints
With so many elements in information security -- application, network infrastructure, the endpoint, perimeter defenses, and data-centric approaches -- it's easy to fall in the trap of touting one as...
View Article21% off SentrySafe Fire-Safe Waterproof File Storage Box - Deal Alert
Where do you store your most important CD's, DVD's, USB drives and documents? Are they protected from fire and water damage, if that "worst-case scenario" actually happens? SentrySafe's HD4100CG...
View ArticleGoogle fixes over 100 flaws in Android, many in chipset drivers
Google released a new batch of Android patches on Wednesday, fixing over 100 flaws in Android's own components and in chipset-specific drivers from different manufacturers. Android's mediaserver...
View ArticleResearchers add software bugs to reduce the number of… software bugs
Researchers are adding bugs to experimental software code in order to ultimately wind up with programs that have fewer vulnerabilities. The idea is to insert a known quantity of vulnerabilities into...
View ArticleThe truth about bug finders: They're essentially useless
Today's popular bug finders catch only about two percent of the vulnerabilities lurking in software code, researchers have found, despite the millions of dollars companies spend on them each year. Bug...
View Article$29.99 for the IT Security & Ethical Hacking Certification Training ($1,895...
If you’re looking to enter a rapidly growing field, snag this course bundle in IT Security & Ethical Hacking. Instructors walk you through training for three industry-recognized certification...
View ArticleSecurity software that uses 'code hooking' opens the door to hackers
Some of the intrusive techniques used by security, performance, virtualization and other types of programs to monitor third-party processes have introduced vulnerabilities that hackers can exploit....
View ArticleOracle's monster security update fixes Java, database bugs
Oracle released its quarterly CPU (Critical Patch Update), addressing a whopping 276 vulnerabilities across 84 products, an all-time high for Oracle. The vast majority of the fixes are in Oracle's...
View ArticleSecurity software that uses 'code hooking' opens the door to hackers
Some of the intrusive techniques used by security, performance, virtualization and other types of programs to monitor third-party processes have introduced vulnerabilities that hackers can exploit....
View ArticleWire open-sources messaging client, woos developers
Communications startup Wire has open-sourced the full codebase for its Wire app, so it's easier for developers to build their own encrypted messaging clients. Wire open-sourced the rest of the client...
View Article