News -


Your one stop for the latest application security articles, stories, and trends, all in one place. Stay on top of the news, and know what’s happening—both at Checkmarx and in the industry at large.


AppSec for dummies: Protecting your organization from application layer security threats
August 5, 2016

I never thought it would happen to me. Unfortunately this kind of thinking applies to so many situations in day to day life. Having your phone stolen from your unlocked... Read More

Checkmarx Announces Exclusive Partnership with TOYO Corporation
August 3, 2016

Checkmarx, a global leader in software application security, today announced it has entered into an exclusive agency partnership with TOYO, leader of the world's most advanced measurement instruments and systems, to offer Checkmarx’ flagship Static Application Security Testing tool “Checkmarx CxSAST” to TOYO customers as a security solution at the... Read More

Pokémon GO—Sacrificing Privacy to Catch ‘Em All?
July 27, 2016

Players of Pokémon GO, a wildly popular location-based augmented reality game, may be missing real life threats to their private information. Pokémon GO creates several privacy and security concerns, particularly... Read More

5 ‘Mr. Robot’ Hacks That Could Happen in Real Life
July 20, 2016

Hollywood hacking films have given the job of hacker a sort of glamour, with their fast-fingered hacks taking over the world, while in picture perfect makeup. And the InfoSec community... Read More

Sports Companies Are Now Facing Security Issues Of Tech Companies
July 19, 2016

When asked about Super Bowl XLI, most casual fans will remember the rain soaked classic in Miami that featured Peyton Manning leading the Indianapolis Colts to his first championship. But... Read More

Securing Code to Fight Cyber Crime
July 19, 2016

The world is moving at an incredible pace. New technologies are regularly announced and whole ecosystems developed around them; such as the internet of things. However, with these new developments come security risks to both businesses and consumers; hacking and cyber crime are now widely reported. The first step to... Read More

Your website may be engaged in secret criminal activity
July 16, 2016

Most of us think of website hacks as illicit activities aimed at siphoning critical information or disrupting the business of website owners. But what happens when your site becomes hacked,... Read More

The Real Threat Of Cyberterrorism
July 11, 2016

Cyberterrorism: just how real is the threat? When confronted with the idea of cyberterrorism, much of the population would shrug. How much would a large scale disruption of computer networks or a malware attack on a government actually affect the average person’s life or livelihood? Is cyberterrorism really an imminent... Read More

Checkmarx and Tantallon help UK financial services institution secure application transition to public cloud
July 7, 2016

Checkmarx announced that together with its partner Tantallon are working with a major UK financial services group to create a new type of ‘belt and braces’ approach to securing and... Read More

The rise of IoT and the associated security risks
July 7, 2016

The proliferation of IoT devices in the workplace presents a huge security risk and if new research from ForeScout Techologies is anything to go by, organisations are ill-prepared to deal... Read More

How To Stay Protected In A World Of Non-Stop Malware Threats
July 5, 2016

Every day, almost one million malware threats are introduced in the ceaseless jungle that is the internet. And yet, software developers, security experts, and IT administrators are expected to stay... Read More

7 Mobile App Dev Vulnerabilities That Can Cost You an Arm and a Leg
July 4, 2016

Shark Week is upon us and making swimmers think twice before jumping in the ocean. The chances that a shark might attack are slim, but hidden dangers are always lurking... Read More

Necessity is the mother of the ‘Rugged DevOps’ movement
June 30, 2016

No matter how good your perimeter security is, experts agree: Your system has been breached, whether you know it or not. The costs of security flaws—cybersecurity expert Joe Franscella calls... Read More

June 2016: The month in hacks and breaches
June 30, 2016

News hit over Memorial Day weekend of a massive breach of the social network Myspace. Usernames and passwords of 360 past and present users were stolen. This may end up being the largest data breach of all time, according to Sophos researchers. At mid-month, the GoToMyPC hack reminded us that... Read More finds 45M leaked VerticalScope user records
June 15, 2016

The outdoor and sports-centric website aggregator VerticalScope was hacked according to an industry watchdog with about 45 million records from more than 1,100 websites being taken and posted to the internet. The compromised data was found by Leakedsource in February 2016 with the records discovered containing information such as email address, username,... Read More

45 Million Potentially Impacted by VerticalScope Hack
June 15, 2016

VerticalScope, which hosts 1,100 websites and forums, was hacked earlier this year, with the details of around 45 million users later leaked online. Some of the most popular online communities hosted by VerticalScope include,,, and, all of which were impacted by data leak. Apparently, the data... Read More

The Beginners Guide To Application Security, AKA The Beginners Guide To Hacking
June 9, 2016

For software developers who quite understandably detest hackers, it probably doesn’t seem natural or appealing to think like a hacker in order to build better applications. But does the FBI... Read More

Millions of Twitter Credentials Up for Sale for Less Than a Cent Each
June 9, 2016

A hacker, who has links to the recent MySpace, LinkedIn and Tumblr data breaches, is claiming another trophy: Millions upon millions of Twitter accounts. The Russian hacker, going by the... Read More

OWASP Top 10 & Open Source Code: Why Watching Your Back Means Watching Everyone Else’s
June 6, 2016

At times, being a developer can feel a little bit like being back in school and getting partnered up on projects. You would work your butt off, fastidiously checking and... Read More

Don’t wait for the police: plugging holes in your website forms to avoid SQL injection
June 6, 2016

It’s been a while since the last major Florida election controversy but at long last the sunshine state has delivered. A cybersecurity researcher exposed serious vulnerabilities in the Lee County... Read More

Skip to content