News

Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Ludovic Henry explains how RISC-V's open ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. Senyo Simpson discusses how Rust's core ...
Common Weakness Enumeration CWE-22, commonly referred to as "path traversal", is a vulnerability in which an application does not appropriately restrict the paths that users can access via ...
At a time when well-publicized security breaches have created corporate -- and public relations -- havoc, the need to create more secure software right from the beginning has never felt so urgent. But ...
Secure software supply chain solution provider Chainguard Inc. today announced Chainguard Libraries, a new product line that offers secure language libraries for Java built directly from source in ...
We recently asked security maven Steve Orrin to tell us some of the tenets of secure coding today. While this was once an administrator's main look-see, it has become part of the developer's job in ...
A coalition of 360 users and vendors led by the SANS Institute last week launched a new information security skills assessment and certification program for corporate and government software ...
Helsinki-based F-Secure has just released its Threat Report for the first half of 2013, and much remains the same: Java in the browser is the main vector for attacks on PCs, Android is taking the ...
When you’re trying to analyze why a program failed, a very valuable piece of information is what the program was actually doing when it failed. In many cases, this can be determined with a stack trace ...
A newly discovered zero-day vulnerability in the widely used Java logging library Apache Log4j is easy to exploit and enables attackers to gain full control of affected servers. Tracked as ...