14 Apr 2013

Common security defects leave programs available to amateur cyber-terrorist, security report states

Author: lavernelee719 | Filed under: .com, 10, 2012, About, ad, ama, anc, app, application, applications, at&t, ati, AV, aws, box, cod, code, con, EA, ec, es, eu, exploit, flaw, hack, hacker, hackers, his, https, i/o, IC, ice, IE, IF, IM, ion, ip, IT, June, june 2012, law, laws, list, MIT, mmo, New, News, nic, one, open, OS, pc, port, pro, rat, RC, report, RIM, rt, sec, Security, Software, SOS, sql, tag, tech, test, testing, ti, TOP, used, web

The program industry’s lack of ability to lessen the amount of security defects in the code is fueling a time from the “everyday hacker,” crooks who are able to exploit weaknesses having a minimum of technical abilities, Security testing firm Vercode’s latest Condition of Software Security (SoSS) report indicates. From the 22,430 programs posted towards the firm’s code analysis service within an 18-month period ending June 2012, only 13 percent of web programs could pass the generic OWASP Top Ten listing of security problems. If this found stand alone programs, only 31 percent complied using the separate CWE/SANS Top 25, a substantial decrease around the compliance rate in the last SoSS report triggered, Veracode recommended, with a larger sample of companies while using service

View publish:

Common security defects leave programs available to amateur cyber-terrorist, security report states

Tags: , , , , , , ,

Leave a Reply

*