The secure coding practices quick reference guide

The secure coding practices quick reference guide


The secure coding practices quick reference guide

Posted: 27 Dec 2010 05:36 AM PST

In the video below, Keith Turpin talks about the secure coding practices quick reference guide. It's a technology agnostic set of general software security coding practices, in a comprehensive checkli...

Man makes career out of suing e-mail spammers

Posted: 27 Dec 2010 05:12 AM PST

There may be a lot people who thought about it, but there is one who decided to actually do it - Daniel Balsam from San Francisco quit his job and started his new career: suing spamming companies. ...

Multiple vulnerabilities in IBM Lotus Mobile Connect

Posted: 27 Dec 2010 05:04 AM PST

A weakness and two vulnerabilities have been reported in IBM Lotus Mobile Connect, according to Secunia. These can be exploited by malicious people with physical access to bypass certain security rest...

The criminal in your browser is real

Posted: 27 Dec 2010 04:40 AM PST

Evidence is everywhere that cyber criminals exist, and they're able to make a substantial living from their illegal activities. While it is true that many are focusing their efforts on individuals, ot...

Carders.cc, Exploit-db.org and others hacked on Christmas

Posted: 27 Dec 2010 03:51 AM PST

Waking up on Christmas morning and finding out you've been hacked must be pretty annoying, and that it what happened to the administrators of Carders.cc - an underground online forum where stolen cred...

The security landscape from 2010 to 2011

Posted: 27 Dec 2010 03:51 AM PST

Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily focused on Nokia's ...

Week in review: DDoS attacks, anti-Facebook worm and identity in the digital age

Posted: 27 Dec 2010 02:18 AM PST

Here's an overview of some of last week's most interesting news, interviews, videos, reviews and articles: How to keep mobile devices secure while traveling 'Tis the season to be jolly – and to ...

0 comments:

Post a Comment