News | Checkmarx Application Security

Checkmarx – Chinese

News

Your one stop for the latest application security articles, stories, and trends, all in one place. Stay on top of the news, and know what’s happening—both at Checkmarx and in the industry at large.

News

Securing Code to Fight Cyber Crime
July 19, 2016

The world is moving at an incredible pace. New technologies are regularly announced and whole ecosystems developed around them; such as the internet of things. However, with these new developments come security risks to both businesses and consumers; hacking and cyber crime are now widely reported. The first step to... Read More

Your website may be engaged in secret criminal activity
July 16, 2016

Most of us think of website hacks as illicit activities aimed at siphoning critical information or disrupting the business of website owners. But what happens when your site becomes hacked,... Read More

The Real Threat Of Cyberterrorism
July 11, 2016

Cyberterrorism: just how real is the threat? When confronted with the idea of cyberterrorism, much of the population would shrug. How much would a large scale disruption of computer networks or a malware attack on a government actually affect the average person’s life or livelihood? Is cyberterrorism really an imminent... Read More

Checkmarx and Tantallon help UK financial services institution secure application transition to public cloud
July 7, 2016

Checkmarx announced that together with its partner Tantallon are working with a major UK financial services group to create a new type of ‘belt and braces’ approach to securing and... Read More

The rise of IoT and the associated security risks
July 7, 2016

The proliferation of IoT devices in the workplace presents a huge security risk and if new research from ForeScout Techologies is anything to go by, organisations are ill-prepared to deal... Read More

How To Stay Protected In A World Of Non-Stop Malware Threats
July 5, 2016

Every day, almost one million malware threats are introduced in the ceaseless jungle that is the internet. And yet, software developers, security experts, and IT administrators are expected to stay... Read More

7 Mobile App Dev Vulnerabilities That Can Cost You an Arm and a Leg
July 4, 2016

Shark Week is upon us and making swimmers think twice before jumping in the ocean. The chances that a shark might attack are slim, but hidden dangers are always lurking... Read More

Necessity is the mother of the ‘Rugged DevOps’ movement
June 30, 2016

No matter how good your perimeter security is, experts agree: Your system has been breached, whether you know it or not. The costs of security flaws—cybersecurity expert Joe Franscella calls... Read More

June 2016: The month in hacks and breaches
June 30, 2016

News hit over Memorial Day weekend of a massive breach of the social network Myspace. Usernames and passwords of 360 past and present users were stolen. This may end up being the largest data breach of all time, according to Sophos researchers. At mid-month, the GoToMyPC hack reminded us that... Read More

Leakedsource.com finds 45M leaked VerticalScope user records
June 15, 2016

The outdoor and sports-centric website aggregator VerticalScope was hacked according to an industry watchdog with about 45 million records from more than 1,100 websites being taken and posted to the internet. The compromised data was found by Leakedsource in February 2016 with the records discovered containing information such as email address, username,... Read More

45 Million Potentially Impacted by VerticalScope Hack
June 15, 2016

VerticalScope, which hosts 1,100 websites and forums, was hacked earlier this year, with the details of around 45 million users later leaked online. Some of the most popular online communities hosted by VerticalScope include Techsupportforum.com, MobileCampsites.com, Pbnation.com, and Motorcycle.com, all of which were impacted by data leak. Apparently, the data... Read More

The Beginners Guide To Application Security, AKA The Beginners Guide To Hacking
June 9, 2016

For software developers who quite understandably detest hackers, it probably doesn’t seem natural or appealing to think like a hacker in order to build better applications. But does the FBI... Read More

Millions of Twitter Credentials Up for Sale for Less Than a Cent Each
June 9, 2016

A hacker, who has links to the recent MySpace, LinkedIn and Tumblr data breaches, is claiming another trophy: Millions upon millions of Twitter accounts. The Russian hacker, going by the... Read More

OWASP Top 10 & Open Source Code: Why Watching Your Back Means Watching Everyone Else’s
June 6, 2016

At times, being a developer can feel a little bit like being back in school and getting partnered up on projects. You would work your butt off, fastidiously checking and... Read More

Don’t wait for the police: plugging holes in your website forms to avoid SQL injection
June 6, 2016

It’s been a while since the last major Florida election controversy but at long last the sunshine state has delivered. A cybersecurity researcher exposed serious vulnerabilities in the Lee County... Read More

5 Ways to Create a Secure Software Development Life Cycle (sSDLC)
June 5, 2016

Enterprise level software needs a tightly bound software development life cycle (SDLC) to ensure deployed applications follow business requirements and stay bug-free. In the Hollywood blockbuster version of this high-stakes... Read More

Easy and Cost-Effective Secure App Development
June 4, 2016

Every year, we see a considerable increase in the number and severity of cybersecurity incidents from which companies suffer major financial losses, harm to their reputation, and irreparable damage to their customers. In 2015 alone, cybercriminals raked in billions of dollars from data breaches, as well as account information for... Read More

Hacking: The Case for Prevention Rather Than Cure
June 2, 2016

When the movie Sneakers came out in 1992, hacking wasn't considered a real threat; it was almost something cool that really clever kids did just to prove they could.  More than two decades later, hacking has taken on a far more sinister tone and become a much more profitable profession.... Read More

The OSI model, your security, and giving special consideration to the application layer
June 2, 2016

There’s a certain poignant disappointment that occurs when your expectations do not align with reality. Especially when your expectations are both reasonable and logical. Take the topic of securing an... Read More

How to Integrate Application Security Testing Into the Agile Development Process
June 2, 2016

Testing and rooting out bugs are integral parts of any successful application development process. Most prominent software development standards, including the popular Agile method, include provisions for making sure the end-product... Read More

Skip to content