Topic: security

SD Times Blog: Researchers discover a hole in Apple’s App Store approval process

A crack in Apple’s vetting process let researchers slip malware into the App Store … continue reading

SD Times Blog: MIT study reveals encryption is less secure than originally thought

Findings are not cause for panic, but they do upend 65 years of assumptions … continue reading

From the Editors: Flat will, ultimately, fall flat

Also, the W3C has to make a decision about codecs; and we can all learn a lesson from Apple’s security hole … continue reading

SD Times Blog: SIM card encryption flaw is an open door for cellphone hacks, German researcher finds

Karsten Nohl finds that total control over cellphones is possible, potentially affecting hundreds of millions of phones … continue reading

SD Times Blog: Moving beyond HTTPS protocols: The need for forward secrecy in network structures

Edward Snowden’s revelations have shown that HTTPs is not as secure as we’ve been led to believe … continue reading

Software security takes the holistic high road

Several companies are trying yet again to make software development a more secure place … continue reading

Vulnerable components added to OWASP’s Top 10 risk list

This year’s list throws some attention to this oft-overlooked issue … continue reading

SD Times Blog: Security is only getting tougher

Coding is tough work, making security a low priority for coders. But there are tools that can help … continue reading

Software development and U.S. export controls

If you plan on exporting software, beware of the labyrinth of compliance and security rules you’ll have to follow … continue reading

RSA remains focused on traditional security approaches

Internet co-creator and other company leaders lay out how they plan on keeping data secure … continue reading

Developers spent 2012 with a new responsibility: Security

Application vulnerabilities still ran rampant in 2012 though, despite developers’ new testing roles … continue reading

The Trouble with Gerrold: Privacy

Users are willing to trade privacy for convenience, but how much disclosure is too much? … continue reading

DMCA.com Protection Status