Application Security

Application Security news, information, and how-to advice

Digital Key
Microsoft IoT Pack for Raspberry Pi 2

iOS 9 on iPhone 6

Hack iOS 9 and get $1 million, cyber security firm says

Exploit acquisition company Zerodium has $3 million to buy iOS jailbreaks, which it plans to share with customers

apple windows

Get to know Mac Gatekeeper, aka Windows 10's security model

Now that Windows has Device Guard, here's how to use its inspiration, Gatekeeper, on the Mac

Security in cloud computing

BitTorrent patches flaw that could amplify distributed denial-of-service attacks

Attackers could use the vulnerability to force BitTorrent applications used by hundreds of millions of users to send malicious traffic

NASA heavy-lift rocket

CoreOS's Rocket aims for greater container isolation

The next generation of CoreOS's container runtime uses Intel hardware-based isolation for added security. Will other container systems follow that example?

flashlight darkness

Cisco: Flash exploits are soaring

Exploit kits are more successful because enterprises don't patch fast enough

Graphic blue background with computer monitor and bug on top

Bug-free code: Another computer security lie

The computer security industry has a dirty secret: If an 'independent' code review says a product is totally secure, you aren't hearing the full story

fb servers

7 essential SQL Server security tips

How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots

vulnerabilities holes windows microsoft

HP's ZDI discloses 4 new vulnerabilities in Internet Explorer

ZDI went public after extending the disclosure deadline twice with no fix forthcoming from Microsoft

security risk thinkstock keyboard

Core Linux tools top list of most at-risk software

In a Core Infrastructure Initiative survey of at-risk software most in need of close attention, many fundamental Linux utilities sit at the top

Critical flaw in ESET products shows why spy groups are interested in antivirus programs

The flaw could allow attackers to fully compromise systems via websites, email, USB drives, and other methods

Hammer breaks glass

HP drops the hammer on unpatched IE11 vulnerability

Microsoft refuses to patch 32-bit Internet Explorer, so HP's Zero Day Initiative responds with full proof-of-concept code

Software applications have on average 24 vulnerabilities inherited from buggy components

Developers often unwittingly use components that contain flaws

binary code open source

Open source: Big benefits, big flaws

Open source is now a dominant force in IT, but experts warn that it can also make things risky and may not be for everyone

email security

Macs in the office: Success breeds security FUD

By all means, secure your Macs -- but don't get taken for a ride when you do so

scales weight justice balance

Find the right balance between security and usability

Make sure your security reduces the burden on users to the minimum required to get the security you truly need

URL-spoofing bug in Safari could enable phishing attacks

Researcher develops code that can trick Safari into showing a different URL in its address bar than the one currently loaded

Google tightens restrictions on Chrome extensions

Most extensions for Windows and Mac will have to be installed from Google's Web Store

Apple logo, patched up

Apple's OS X 'Rootpipe' patch flops, fails to fix flaw

Researcher finds 'trivial way' to exploit privilege escalation vulnerability after Apple tries to plug Yosemite hole

Load More