LogiGear announced new continuous delivery findings as part of its software industry survey series designed to assess the state of software testing. This is the second survey in the four-part series. The survey on DevOps, and found most known pain points of transitioning to DevOps involves getting groups that don’t naturally work well together to have the … continue reading
CodeFights is updating its Interview Practice tool to help developers better prepare for their next job opportunity. With CodeFights, developers can practice their programming skills, learn new languages, and prepare for interviews in a community of more than 500,000 developers. The latest version of Interview Practice allows developers to join a study plan with a … continue reading
The cloud provides huge benefits when it comes to agility and scale, but it also can cause major headaches and problems for businesses. The latter was evident last week when Deep Root Analytics, a data management platform provider, suffered from a data leakage. The leak resulted in data exposure of more than 198 million American … continue reading
Google is making it easier to experiment with deep learning technologies with the release of Tensor2Tensor (T2T). T2T is an open source system for training deep learning mobiles with TensorFlow, Google’s software library for machine intelligence. With T2T, users can create models for apps like translation, parsing, image captioning and more. T2T includes a library … continue reading
Google is releasing the first reCAPTCHA Android API for Google Play Services. The API will provide a streamlined user experience on mobile and include the latest invisible reCAPTCHA technology. Google first announced Invisible reCAPTCHA in March as a way to run risk analysis behind the scenes, allowing users to pass through the system with zero … continue reading
A group of researchers want to help the cybersecurity community find hidden threats in their solutions. Together, 17 cybersecurity experts have teamed up to launch threathunting.org. The new online hub, sponsored by Sqrrl, provides practical resources, expert research and training material on how to hunt security threats. “There are a lot of people who want … continue reading
Though many in IT focus on external threats, I believe that the ‘enemy within’ may be just as damaging. Addressing the human element, both malicious and unintentional, may generate some of the greatest returns on security investment. Counter to conventional wisdom, the majority of breaches are not due to malicious intent. According to Ponemon, 52% … continue reading
After weeks of tease, creator of Android Andy Rubin has unveiled a new smartphone: The Essential Phone. The phone is being introduced as part of Rubin’s latest company, Essential. According to Rubin, the belief behind Essential is that devices should be personal property, play well with others, shouldn’t become outdated, and should assist the user. … continue reading
In an effort to better protect their users, Google is giving developers new updates when it comes to publishing web applications. The company is updating the app publishing process, risk assessment systems, and user-facing consent page to detect any abnormalities and protect against spoofing or misleading application identities. In addition, the company’s risk assessment process … continue reading
Google released OSS-Fuzz five months ago with a mission to make open-source projects stable, secure and reliable. Since then, the continuous fuzzing solution has found more than 1,000 bugs with 264 of them flagged as potential security bugs. “OSS-Fuzz has found numerous security vulnerabilities in several critical open source projects: 10 in FreeType2, 17 in … continue reading
As an effort to help users create secure passwords, researchers from Carnegie Mellon University and the University of Chicago have developed a new solution that provides password advice. The new password meter not only tells users in real time whether or not their password is good, but it offers feedback and advice on how the … continue reading
My team in the Threat Research Center at WhiteHat Security specializes in mobile application business logic assessments, which is a hands-on penetration test of both mobile client-side apps and the business logic that can be used to circumvent the security built into the program. In a rapid application development environment, it’s a best practice (and … continue reading