This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Template:OWASP News

From OWASP
Revision as of 19:18, 31 July 2006 by OWASP (talk | contribs)

Jump to: navigation, search
Jul 31 - CAL9000 v1.1 released
The in-browser JavaScript based web app testing framework has added enhanced encode/decode functions and several bugfixes.
Jul 31 - Fortify donates vulnerability research to OWASP
Announcing a new extensive classification of software security vulnerabilities created and donated by Fortify Security Inc. The full set of vulnerabilities and the research that accompanies it is available in the OWASP Honeycomb Project.
Jul 11 - Two part interview on Ajax with OWASP's Andrew van der Stock
In this two part interview, Andrew discusses the key security threats facing Ajax applications and practical advice for securing them. "I expect more Ajax vulnerabilities and exploits to surface, and I expect researchers to come up with additional "new" flaws that need to be protected against."
Jun 29 - OWASP .NET project now at www.owasp.org
Coming full circle, the OWASP .NET Project (lead by Dinis Cruz) is now hosted here at the www.owasp.org website. The objective is to consolidate all OWASP projects in one location, and to benefit from cross-project linkage. All information that was hosted at the previous www.owasp.net wiki has now been ported and in the comming weeks, more will be added.
Jun 26 - OWASP PHP Top 5 Released
OWASP is pleased to announce the immediate availability of OWASP PHP Top 5. The OWASP Top 5 is an education piece which provides up to date advice to PHP developers, hosters, and other PHP users. The Top 5 is produced by the OWASP PHP Project.
Jun 23 - New version of WebScarab released
The new version has a new logo, several new features, and some bugfixes. There are better capabilities for authentication and certificates, dropping conversations, and searching results. There are plugin enhancements to the spider, session id analyzer, and fuzzer. There's also a new extension for forced browsing to obvious extensions.
Older news...