This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:Application Security News"

From OWASP
Jump to: navigation, search
Line 3: Line 3:
 
: Comment or "Quote"
 
: Comment or "Quote"
 
-->
 
-->
 +
 +
; '''Jul 24 - [http://www.theregister.co.uk/2006/07/22/bug_hunters_crawl_over_ms_office/page3.html Fuzzing comes of age]'''
 +
: "In fact, fuzzing tools appear to be the source of the deluge of Office flaws. Once considered a crutch for the lowest form of code hacker - the much-denigrated "script kiddie" - data-fuzzing tools have gained stature to now be considered an efficient way to find vulnerabilities, especially obscure ones."
  
 
; '''Jul 20 - [http://news.netcraft.com/archives/2006/07/20/paypal_xss_exploit_available_for_two_years.html PayPal challenges Oracle for longest time-to-fix]'''
 
; '''Jul 20 - [http://news.netcraft.com/archives/2006/07/20/paypal_xss_exploit_available_for_two_years.html PayPal challenges Oracle for longest time-to-fix]'''
Line 15: Line 18:
 
; '''Jul 18 - [http://www.networkworld.com/news/2006/071006-visa-security.html?page=4 PCI to require security code reviews]'''
 
; '''Jul 18 - [http://www.networkworld.com/news/2006/071006-visa-security.html?page=4 PCI to require security code reviews]'''
 
: "The way the standard reads today, all provisions are treated equally, Litan says. She expects PCI's creators may address some prioritization issues in an updated version of the standard, which could be completed by the end of the summer or this fall. The upgraded standard also is expected to contain new provisions for conducting software code reviews."
 
: "The way the standard reads today, all provisions are treated equally, Litan says. She expects PCI's creators may address some prioritization issues in an updated version of the standard, which could be completed by the end of the summer or this fall. The upgraded standard also is expected to contain new provisions for conducting software code reviews."
 
; '''Jul 18 - [http://www.fortifysoftware.com/reports/threatreport.jsp Fortify study shows raging storm]'''
 
: "On average, 50%-70% of attacks experienced by web applications come from bots and bot networks searching for known vulnerabilities...The effect is much like a storm raging over a landscape – the probes are sprayed throughout the Internet and ceaselessly (and somewhat randomly) hit web applications."
 
 
; '''Jul 18 - [http://pestilenz.org/cgi-bin/blosxom.cgi/2005/11/11 Think liability for vendors will work? Try unreliable programming]'''
 
: Imagine there was liability for software vendors. They would introduce "an interesting new paradigm of programming. Methods of this school of programming could include: Do something random, procrastination, decoy, blame someone else, and Inject errors in other running programs."
 
  
 
; [[Application Security News|Older news...]]
 
; [[Application Security News|Older news...]]

Revision as of 11:01, 24 July 2006


Jul 24 - Fuzzing comes of age
"In fact, fuzzing tools appear to be the source of the deluge of Office flaws. Once considered a crutch for the lowest form of code hacker - the much-denigrated "script kiddie" - data-fuzzing tools have gained stature to now be considered an efficient way to find vulnerabilities, especially obscure ones."
Jul 20 - PayPal challenges Oracle for longest time-to-fix
Daring people to sue for negligence, PayPal ignored a 2004 notification of a "cross site scripting attack that affected donation pages for suspended users." This "is the exact method exploited by the phishing attack in June 2006."
Jul 19 - SQL injection flood reported
"From January through March, we blocked anywhere from 100 to 200 SQL Injection attacks per day. As of April, we have seen that number jump from 1,000 to 4,000 to 8,000 per day...The majority of the attacks are coming from overseas, and although we certainly see a higher volume with other types of attacks, what makes the SQL Injection exploits so worrisome is that they are often indicative of a targeted attack."
Jul 18 - Symantec deflowers Vista
"Microsoft has removed a large body of tried and tested code and replaced it with freshly written code, complete with new corner cases and defects...Vista is one of the most important technologies that will be released over the next year, and people should understand the ramifications of a virgin network stack."
Jul 18 - PCI to require security code reviews
"The way the standard reads today, all provisions are treated equally, Litan says. She expects PCI's creators may address some prioritization issues in an updated version of the standard, which could be completed by the end of the summer or this fall. The upgraded standard also is expected to contain new provisions for conducting software code reviews."
Older news...