Syndicated Blog

Blog – Checkmarx
Application Security, Made Easy
Learn How You Can Get a Running Start with DevSecOps

Learn How You Can Get a Running Start with DevSecOps

DevOps is an evolving philosophy, and now is the time–just as you start embracing DevOps in your organization–to start building security into both your DevOps philosophy and processes. DevOps philosophy started with ...
Lenovo Watch X Pairing: A Little Too Easy

Your Lenovo Watch X Is Watching You & Sharing What It Learns

A friend of mine offered me a Lenovo Watch X – which costs around €60 – in return for helping him with a security project. I was impressed with the design and ...
Watch the AEG Scale Denial of Service

Your Smart Scale is Leaking More than Your Weight: Privacy Issues in IoT

These days IoT devices are an easy entry point for malicious users to invade users privacy. With that in mind, we tested the AEG Smart Scale PW 5653 BT, specifically the Bluetooth ...
Shifting to DevSecOps, with Software Security Testing Built In

Shifting to DevSecOps, with Software Security Testing Built In

Many organizations today are in the process of transitioning to a DevOps-centric approach, but don’t want to leave security behind. In order to build security in from the beginning of their software ...
Software Security Predictions: What to Watch for in 2019

Software Security Predictions: What to Watch for in 2019

Security breaches regularly made headlines this year, while advancements in DevOps, application security testing tools, artificial intelligence, machine learning, cloud adoption, and the Internet of Things race forward. 2019 promises to be ...
Android WebView: Are Secure Coding Practices Being Followed?

Android WebView: Are Secure Coding Practices Being Followed?

WebViews are very common on the Android applications. There are clear WebView security best practices, but are they being implemented? With our previous blog post in mind, Android WebView: Secure Coding Practices, ...
9 Key Players for a Winning Security Team

9 Key Players for a Winning Security Team

Basketball legend Michael Jordan once said, “Talent wins games, but teamwork and intelligence win championships.” When it comes to something as important as your company’s security, you can’t afford to rely on ...
NFCdrip: Data Exfiltration Research in Near Field Communication

NFCdrip: Data Exfiltration Research in Near Field Communication

Near-field communication (NFC) is a set of protocols that enables two electronic devices to establish communication by bringing them very close together. Usually the devices must be within less than 4cm. Contactless ...
Loading...