Secure Code Reviews (bringing someone in from outside of the team to review/audit the code for security vulnerabilities) and application Pen Tests (again, bringing a security specialist in from outside the team to test the system) are both important practices in a secure software development program.
Browsing: Malware and Vulnerabilities
The clock is ticking as web applications take center stage as the point of entry for malicious activity and development teams are asked to deliver new applications at breakneck speed.
Mobile network giant Telefonica has launched new business unit Eleven Paths, which promises unprovoked attacks on customers every day, in the interests of greater security.
Organizations Should Look for Ways to Involve Employees in Mitigating and Eliminating Threats Before they Happen…
Researchers say they have discovered a sophisticated trojan that targets Android smartphones – exploiting two previously unknown vulnerabilities in the mobile platform and a third flaw in separate software – to send text messages to premium-rate numbers and download other malware onto victims’ phones.
In the last year or so, we’ve seen significant growth in attacks on web servers, as opposed to the more traditional attacks on individual users.
A new examination of mobile threat data from the Lookout Platform in five countries has found that threats to consumers run the gamut, from annoying to extremely invasive. The study has uncovered that adware and malware threats like spyware, surveillanceware and trojans are in particular proliferating.
This IDC Technology Spotlight examines trends in enterprise security and the role that the IBM Security AppScan portfolio plays in this strategic market.
More malware is appearing on mobile devices themselves, and despite security measures such as full-device encryption, they can steal information regardless of the roadblocks that businesses put in their way, according to V-Key CTO Joseph Gan.
There was a time when the Windows PC was the computer platform that was most vulnerable to malware and hacking. Although some malicious hackers were targeting Nokia’s Symbian mobile operating system