Post Tagged with: "Web"

The Challenge of Securing REST APIs

August 29, 2015 16:000 comments
The Challenge of Securing REST APIs

  In-brief: RESTful application program interfaces (APIs) are a key ingredient to building powerful, scalable web-based applications. But they can also open the door to web-based attacks, while also baffling traditional penetration testing tools and processes. In this article, Barracuda’s Neeraj Khandelwal explains why.

Read more ›

Study: Financial Firms Hit Hard By Targeted Attacks

June 25, 2015 12:160 comments
A graphic shows threats targeting financial services organizations vs. non financial services focused attacks in purple. (Image courtesy of Websense/Raytheon.)

In-brief: A new report from the firm Websense finds that financial services firms are being hit hard by cyber attacks, including targeted attacks aimed at luring employees into installing malicious software on corporate networks.

Read more ›

Survey Finds Government Application Security Wanting

June 23, 2015 08:480 comments
Veracode compiled data on application scans covering 18 months in its State of Software Security report.

In-brief: A survey of web and mobile applications by the firm Veracode finds that governments are the most likely to use insecure software, as measured against the OWASP (Open of Web Application Security Project) Top 10.

Read more ›

Updated: Google warns of unauthorized TLS certificates trusted by almost all OSes | Ars Technica

March 24, 2015 10:49Comments Off on Updated: Google warns of unauthorized TLS certificates trusted by almost all OSes | Ars Technica
Updated: Google warns of unauthorized TLS certificates trusted by almost all OSes | Ars Technica

In-brief: Google warned its users that unauthorized digital certificates have been issued for several of its domains. The certificates are linked to an intermediary certificate authority for CNNIC, which administers China’s domain name registry. Updated with comment from Kevin Bocek of Venafi. Paul 3/27/2015 

Read more ›
%d bloggers like this: