Quantcast
Channel: JavaWorld Security
Browsing all 148 articles
Browse latest View live

10 AWS security blunders and how to avoid them

The cloud has made it dead simple to quickly spin up a new server without waiting for IT. But the ease of deploying new servers -- and the democratic nature of cloud management -- can be a security...

View Article


The 7 most vexing problems in programming

It’s been said that the uncharted territories of the old maps were often marked with the ominous warning: “Here be dragons.” Perhaps apocryphal, the idea was that no one wandering into these unknown...

View Article


10 things you need to worry about in 2017

Each year, including last year, I’ve supplied you with “areas of concern”—that is, stuff that might not go well for you or our comrades in the coming 12 months. I’m happy to oblige once again this...

View Article

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal...

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in....

View Article

5 core topics Trump needs to address in Silicon Valley leaders meeting

As some of the tech sector’s heaviest hitters prep for a meeting this week with president-elect Donald Trump, they need to make sure they get answers to critical questions about issues that could...

View Article


49% off CyberPower Surge Protector 3-AC Outlet with 2 USB (2.1A) Charging...

The Professional Surge Protector CSP300WUR1 safeguards common home and office devices, such as computers and electronics, by absorbing spikes in energy caused by storms and electrical power surges....

View Article

Google open-sources test suite to find crypto bugs

Working with cryptographic libraries is hard, and a single implementation mistake can result in serious security problems. To help developers check their code for implementation errors and find...

View Article

5 signs we're finally getting our act together on security

The high-water line in information security gets higher each year. Just as we think we’ve finally figured out how to defend against attacks, then attackers come up with something new and we are right...

View Article


Data breaches through wearables put target squarely on IoT in 2017

Forrester predicts that more than 500,000 internet of things (IoT) devices will suffer a compromise in 2017, dwarfing Heartbleed. Drop the mic — enough said.With the sheer velocity of how the...

View Article


Exposed MongoDB installs being erased, held for ransom

Security researcher Victor Gevers, co-founder of the GDI Foundation, a non-profit dedicated to making the internet safer, is urging administrators to check their MongoDB installations, after finding...

View Article

Git Hound, Truffle Hog root out GitHub leaks

It's App Dev 101: Don't hard-code API tokens, encryption keys, and user credentials. But if you do, make sure to get them out of your code before committing to GitHub or other public code...

View Article

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal...

NordVPN gives you a private and fast path through the public Internet. All of your data is protected every step of the way using revolutionary 2048-bit SSL encryption even a supercomputer can’t crack....

View Article

43% off Microsoft Wireless Desktop 900 Keyboard and Mouse Bundle - Deal Alert

The Wireless Desktop 900 keyboard from Microsoft has quiet-touch keys and customizable buttons for access to the Windows features you use most. The full-size ambidextrous mouse provides comfortable,...

View Article


Oracle to Java devs: Stop signing JAR files with MD5

Starting in April, Oracle will treat JAR files signed with the MD5 hashing algorithm as if they were unsigned, which means modern releases of the Java Runtime Environment (JRE) will block those JAR...

View Article

Attackers start wiping data from CouchDB and Hadoop databases

It was only a matter of time until ransomware groups that wiped data from thousands of MongoDB databases and Elasticsearch clusters started targeting other data storage technologies. Researchers are...

View Article


Researchers propose a way to use your heartbeat as a password

Researchers at Binghamton State University in New York think your heart could be the key to your personal data. By measuring the electrical activity of the heart, researchers say they can encrypt...

View Article

41% off Netgear Arlo Security System Wireless HD Camera, Indoor/Outdoor,...

The Arlo camera is a 100 Percent Wire-Free, completely wireless, HD smart home security camera – so you can get exactly the shot you need – inside or out. The Arlo camera is weatherproof and includes...

View Article


Image may be NSFW.
Clik here to view.

InfoWorld's 2017 Technology of the Year Award winners

2017 Technology of the Year AwardsImage by Jane Van GinkelDid you notice that Google is giving away its magic sauce? Google engineers used to merely write papers about their creations, then leave it to...

View Article

GitLab database goes out after spam attack

Code-hosting site GitLab has suffered an outage after sustaining a "serious" incident on Tuesday with one of its databases that has required emergency maintenance. The company today said it lost six...

View Article

Open source users: It’s time for extreme vetting

Open source software is the norm these days rather than the exception. The code is being written in high volumes and turning up in critical applications. While having this code available can offer big...

View Article
Browsing all 148 articles
Browse latest View live