The new series of articles "Secure Coding" provides a comprehensive guide to secure programming practices – specifically tailored to Java developers. In today's digital landscape, security is more ...
The article Secure Coding: Preventing unauthorized access through path traversal (CWE-22) has already described the dangers posed by the critical vulnerability CWE-22 (path traversal) in software ...
Make Java security a top priority at every stage of application development, from class-level language features to API endpoint authorization Security is one of the most complex, broad, and important ...
Amazon Web Services (AWS) has updated the 'detectors' in its CodeGuru Reviewer tool to seek out log injection flaws like the recently disclosed Log4Shell bug in the popular Java logging library Log4J.
One of the most common problems identified by static code analysis tools is the presence of plain text passwords written directly into configuration files. It's ...
When you’re trying to analyze why a program failed, a very valuable piece of information is what the program was actually doing when it failed. In many cases, this can be determined with a stack trace ...
We recently asked security maven Steve Orrin to tell us some of the tenets of secure coding today. While this was once an administrator's main look-see, it has become part of the developer's job in ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results