Printer Friendly

Browse Software security topic

Articles

1-141 out of 141 article(s)
Title Author Type Date Words
Veracode State of Software Security. Nov 1, 2020 582
EPfuzzer: Improving Hybrid Fuzzing with Hardest-to-reach Branch Prioritization. Wang, Yunchao; Wu, Zehui; Wei, Qiang; Wang, Qingxian Sep 1, 2020 7918
Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications. Shen, Limin; Li, Hui; Wang, Hongyi; Wang, Yihuan Report Jun 30, 2020 9509
WORDPRESS/APACHE MOST WEAPONIZED WEB/APP FRAMEWORKS. Apr 1, 2020 650
Google Play Store reportedly failed to detect 29 malicious apps that had over 10 million collective downloads. Sep 27, 2019 473
Joker malware on Google Play Store has infected 24 apps, half a million users affected. Sep 10, 2019 394
iPhone bug also accessed WhatsApp chats, Gmail, Contacts and more: Google. Sep 3, 2019 349
WhatsApp flaw allows hackers to edit your messages and completely change what you sent. Aug 9, 2019 499
Apple is offering $1 million bounty to researchers to spot security bugs in the Apple ecosystem. Aug 9, 2019 328
iOS Flaws let hackers break into iPhones by just sending a text. Aug 8, 2019 352
Apple's AirDrop can leak your phone number: Report. Aug 3, 2019 306
Google researchers find six iOS security bugs worth $5 million. Jul 31, 2019 380
Alleged VLC security flaw denied by developers. Jul 24, 2019 395
Media File Jacking: WhatsApp, Telegram media files can be manipulated on Android devices. Jul 16, 2019 637
Almost 60% of email servers on the internet affected by new RCE vulnerability: Report. Jun 6, 2019 411
Researcher finds MacOS Mojave flaw, links it to abuse of trusted apps. Jun 4, 2019 486
Microsoft urges those using older Windows PCs to update their devices. Brief article Jun 1, 2019 262
NEW WINDOWS 10 ZERO-DAY VULNERABILITY SURFACES ONLINE WITH PROOF OF CONCEPT VIDEO. May 23, 2019 401
WHATSAPP SPYWARE: ISRAELI FIRM NSO LINKED TO HACK FACES LAWSUIT. May 20, 2019 389
TELEGRAM FOUNDER CRITICISES WHATSAPP HARSHLY, SAYS IT "WILL NEVER BE SECURE". May 19, 2019 347
Xiaomi's Mi browser, Mint Browser reportedly affected with serious URL spoofing vulnerability. Apr 8, 2019 360
Researcher holds Asus responsible for cyber attack on its software update utility. Mar 29, 2019 433
Facebook vulnerability in Messenger revealed who you were chatting with. Mar 9, 2019 388
Google Chrome's zero-day vulnerability could let attacker gain full control of your system, here's how to stay safe. Mar 8, 2019 396
Applying Topic Modeling and Similarity for Predicting Bug Severity in Cross Projects. Yang, Geunseok; Min, Kyeongsic; Lee, Jung-Won; Lee, Byungjeong Report Mar 1, 2019 4769
A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments. Choi, Seul-Ki; Lee, Taejin; Kwak, Jin Case study Mar 1, 2019 4178
Apple sued over FaceTime eavesdropping bug. Jan 30, 2019 455
"Fake" GPS apps on Play Store are an indication of a much bigger problem with Indian apps. Jan 21, 2019 863
Protecting Your Software Supply Chain. Blessman, Danika Jan 1, 2019 1157
Analysis of Web Browser Security Configuration Options. Jillepalli, Ananth A.; de Leon, Daniel Conte; Steiner, Stuart; Alves-Foss, Jim Report Dec 1, 2018 9313
Fighting Hidden Software Risks on Defence Agency Networks. Smyth, Vincent Nov 1, 2018 1194
Retailers acting quickly to fix flaws in software but code quality issues remain rampant. Nov 1, 2018 355
High-Tech Privacy Threats. Brief article Oct 1, 2018 187
A Practical Intent Fuzzing Tool for Robustness of Inter-Component Communication in Android Apps. Choi, Kwanghoon; Ko, Myungpil; Chang, Byeong-Mo Technical report Sep 1, 2018 10547
A Policy-based Mechanism for restricting Execution of malicious apps in Android Smartphone. Dwivedi, Sanjeev Kumar; Muthumanickam, K.; Bist, Ankur Singh; Mahesh, P.C. Senthil Jul 1, 2018 3035
Siloed security approach 'no longer an option'. Brief article Jun 1, 2018 194
Despite Major Vulnerability Disclosures Like WannaCry, New Research Finds that Open Source Components Fail to Receive Suitable Security Attention. Apr 1, 2018 449
Forensic Investigation Technique on Android's Blackberry Messenger using NIST Framework. Riadi, Imam; Sunardi; Firdonsyah, Arizona Report Oct 1, 2017 3332
An Attempt toward Authorship Analysis of Obfuscated .NET Binaries. Morovati, Kamran Report Sep 1, 2017 7982
Anatomy of a cross-site scripting flaw in the Telerik reporting module. Runkle, Matt Jun 1, 2017 919
The Snowden disclosures, technical standards, and the making of surveillance infrastructures. Rogers, Michael; Eden, Grace Report Feb 1, 2017 9418
Cyber security, threat intelligence: Defending the digital platform. Opara, Emmanuel U.; Hussein, Mohammed T. Report Jan 1, 2017 3938
Control flow checking at virtual edges. Liu, LiPing; Ci, LinLin; Liu, Wei; Yang, Hui Report Jan 1, 2017 8232
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications. Dalai, Asish Kumar; Jena, Sanjay Kumar Report Jan 1, 2017 8115
PMCAP: A Threat Model of Process Memory Data on the Windows Operating System. Pan, Jiaye; Zhuang, Yi Report Jan 1, 2017 10541
Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners. Alsaleh, Mansour; Alomar, Noura; Alshreef, Monirah; Alarifi, Abdulrahman; Salman, AbdulMalik Al- Report Jan 1, 2017 11142
Deduplication and exploitability determination of UAF vulnerability samples by fast clustering. Peng, Jianshan; Zhang, Mi; Wang, Qingxian Report Oct 1, 2016 7848
Four out of five applications written in web scripting languages fail OWASP top 10. Veracode. Jan 1, 2016 865
Mobile app installation: the role of precautions and desensitization. Harris, Mark A.; Chin, Amita Goyal; Brookshire, Robert Report Oct 1, 2015 7041
Android's Stagefright vulnerability down to security experts' failure to rehearse for threats. Sep 1, 2015 350
Personal online security. Vawter, Edward May 1, 2015 2794
BS.Player exploit poses major security risk. May 1, 2015 374
Advances of mobile forensic procedures in Firefox OS. Yusoff, Mohd Najwadi; Mahmod, Ramlan; Dehghantanha, Ali; Abdullah, Mohd Taufik Report Oct 1, 2014 8798
Security breaches, network exploits and vulnerabilities: a conundrum and an analysis. Soluade, Oredola A.; Opara, Emmanuel U. Report Oct 1, 2014 6707
Radware protects against Bash Bug Shellshock vulnerability. Brief article Sep 29, 2014 163
The failures of Heartbleed. Spider, Russ Jul 1, 2014 1032
What Heartbleed means for the future of the internet. Griffin, Donovan Jun 1, 2014 1919
Fortinet's FortiGuard Labs uncovers 18 new zero-day vulnerabilities in 2013. Brief article Apr 16, 2014 232
Fortinet's FortiGuard Labs uncovers 18 new zero-day vulnerabilities in 2013. Brief article Apr 16, 2014 218
Integrating Software Security into Agile-Scrum method. Ghani, Imran; Azham, Zulkarnain; Jeong, Seung Ryul Report Feb 1, 2014 6646
RPFuzzer: a framework for discovering router protocols vulnerabilities based on fuzzing. Wang, Zhiqiang; Zhang, Yuqing; Liu, Qixu Report Aug 1, 2013 8266
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies. Kindy, Diallo Abdoulaye; Pathan, Al-Sakib Khan Report Aug 1, 2013 7571
Welcome to the malware-industrial complex: the U.S. government is developing new computer weapons and driving a black market in "zero-day" bugs. The result could be a more dangerous Web for everyone. Simonite, Tom May 1, 2013 989
Riphah varsity holds reception for professionals. Brief article Apr 28, 2013 119
Improved security, expanded web parts. Brief article Feb 1, 2013 171
Android apps may leak personal data. Brief article Jan 1, 2013 218
Technical security metrics model in compliance with ISO/IEC 27001 standard. Azuwa, M.P.; Ahmad, Rabiah; Sahib, Shahrin; Shamsuddin, Solahuddin Report Oct 1, 2012 3442
Runtime monitoring technique to handle tautology based SQL injection attacks. Dharam, Ramya; Shiva, Sajjan G. Report Jul 1, 2012 6343
Security measurement based on GQM to improve application security during requirements stage. Abdulrazeg, Ala A.; Norwawi, Norita Md; Basir, Nurlida Report Jul 1, 2012 4239
Proximex' Surveillint 6.0 now available in EMEA. Brief article May 14, 2012 205
Oracle patch updates. Brief article May 1, 2012 292
ESET announces strategic agreement with EMPA. Brief article Apr 16, 2012 113
Innovative offers new products in set of Infinity Screening solutions. Brief article Apr 5, 2012 169
McAfee Mobile Security 2.0 now available. Brief article Jan 30, 2012 223
McAfee deploys Star Command Center and Star Integration Server from Star Analytics. Brief article Nov 29, 2011 180
Snapguard introduces insider threat prevention platform Snapguard 2.0. Brief article Oct 25, 2011 164
NATO approval for Sectra security solution. Brief article Sep 15, 2011 126
ExoIS introduces PeepSafe 2.0 for improved PCI compliance. Jun 13, 2011 344
AVG Family Safety released by AVG. Brief article Apr 13, 2011 112
McAfee unveils enhanced mobile security offerings. Brief article Feb 22, 2011 243
NetQin unveils version 4.6 Beta of anti-virus application. Brief article Jan 21, 2011 136
Quaresso unveils new version of Protect On Q. Brief article Nov 15, 2010 210
Quaresso unveils new version of Protect On Q. Brief article Nov 15, 2010 212
BlackBelt unveils Mobile AntiTheft solution for Android. Brief article Nov 2, 2010 138
New version of Webroot Web Security Service available. Brief article Oct 18, 2010 126
ContentWatch introduces new line of ContentProtect Security Appliances. Brief article Oct 6, 2010 268
Kanguru launches Kanguru Defender Basic. Brief article Jul 20, 2010 105
Total Immersion unveils D'Fusion for Adobe Flash Player. Brief article Jul 8, 2010 159
F-Secure releases latest version of Android security protection. Brief article Jun 30, 2010 135
Emsisoft releases new version of anti-malware application. Brief article May 12, 2010 193
Unitrends unveils Adaptive Deduplication. Brief article Apr 27, 2010 158
Reasonableness meets requirements: regulating security and privacy in software. Otto, Paul N. Nov 1, 2009 15336
CocoSys releases new version of EndPoint Protector, compatible with both Windows 7 and Mac OS X Snow Leopard. Brief article Oct 14, 2009 167
New version of session monitoring tools from SSH Communications Security. Brief article Oct 6, 2009 195
Domain malicious threats. Oct 1, 2009 447
CRYPTOCard introduces new ICE solution to allow companies to make provisions for secure emergency remote working for staff. Brief article Aug 25, 2009 185
Finjan prevents zero-day exploit. Brief article Aug 1, 2009 189
The importance of standardising methodology in penetration testing. Frankland, Jane Jun 1, 2009 824
Contentbarrier X5 Dual released by Intego. Brief article Apr 24, 2009 112
BitDefender releases free tool to clean machines infected with Downadup virus. Brief article Mar 11, 2009 162
CyberDefender Registry Cleaner unveiled by CyberDefender. Brief article Nov 21, 2008 164
Descartes Systems Group launches latest Importer Security Filing logistics solutions. Brief article Nov 20, 2008 292
AirMagnet Enterprise 8.1 offers wireless rogue tracing and containment. Brief article Sep 18, 2008 154
Diskeeper launches Undelete 2009. Brief article Aug 20, 2008 112
Detica to develop 40Gb/s Streamshield range. Brief article Jul 9, 2008 143
Steganos Password Manager 2009. Brief article Jun 1, 2008 285
Protegrity expands functionality of Defiance Security Suite. Brief article Apr 7, 2008 162
WorkLight Inc launches first Secure Enterprise 2.0 Forum in North America. Brief article Apr 3, 2008 179
ModSecurity v2.5 introduced by Breach Security. Brief article Mar 25, 2008 162
Sony confirms security flaw on third party software. Brief article Sep 4, 2007 232
Spyware protection: seek and destroy embedded bugs. Davis, James P. Apr 1, 2007 1114
McAfee Mobile Security Risk Management launched by McAfee. Brief article Feb 2, 2007 217
The law and economics of software security. Hahn, Robert W.; Layne-Farrar, Anne Sep 22, 2006 28050
Growing threat to online applications. Piazza, Peter Sep 1, 2006 372
NTA Monitor publishes 2006 Annual Security Report. Brief article Jun 9, 2006 211
N.J. School District has an eye on security. Butler, Kevin Jun 1, 2006 526
Internet Security Systems protects customers against Windows WMF exploits. Brief Article Jan 9, 2006 154
The Tropos metamodel and its use. Susi, Angelo; Perini, Anna; Mylopoulos, John; Giorgini, Paolo Nov 1, 2005 4728
Security product holes. Brief Article Sep 1, 2005 80
Enterprise rights management heats up. Smallwood, Robert Sep 1, 2005 2037
Improved protection for handhelds now in beta-testing. Brief Article Mar 1, 2005 231
CipherTrust launches TrustedSource 3.0. Brief Article Feb 1, 2005 159
McAfee SecurityShield verified for Microsoft ISA Server 2004. Brief Article Nov 5, 2004 131
Open source security-still a myth. Vieg, John Nov 1, 2004 3451
Prevx launches free host intrusion prevention software. Brief Article Sep 6, 2004 128
Intelligence is the best defense: a public-private group that provides intelligence to the financial services sector has revamped operations to adapt to new security challenges. Piazza, Peter Sep 1, 2004 4208
Network Box provides new signature set to customers. Brief Article Aug 9, 2004 151
A high-tech R & D Agenda. Piazza, Peter Aug 1, 2004 309
Top ten facts on spam firewalls. Aug 1, 2004 1354
Two-factor authentication market growing rapidly. Brief Article Aug 1, 2004 234
93% website apps vulnerable after 'fixing'. Aug 1, 2004 459
Upgraded security products ship from Finjan. Brief Article Jul 1, 2004 144
Tumbleweed Appliance Tightens Spam Net. Brief Article Jun 29, 2004 118
Compliance Market Shows 25% Growth Spurt. Brief Article Apr 6, 2004 101
BS 7799 explained. Apr 1, 2004 896
Netilla Adds End-Point Security to DynaTRUST. Brief Article Mar 18, 2004 305
INTELLECTUAL PROPERTY: COUNCIL SHOULD STICK TO ITS GUNS ON SOFTWARE PATENTS. Feb 14, 2004 462
Survey apportions software liability. Brief Article Feb 1, 2004 266
Ask FERF (financial executives research foundation) about ... IT security. Graziano, Cheryl de Nesa Dec 1, 2003 601
Is your network secure? Danger lurks everywhere, but there are plenty of things businesses can do to protect their networks. Geer, David Dec 1, 2003 1599
Prometheus rewired. Piazza, Peter Oct 1, 2003 677

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters |