Secure coding


19 articles

Secure Coding

IT forensic tools: How to find the right one for each incident

IT forensic tools: How to find the right one for each incident

Secure Coding

IT forensic tools: How to find the right one for each incident

Some online resources that will help you find the most suitable IT forensic tools for each case

Lucas Paus03 Oct 2018


Secure Coding

Programmer's Day: Resources to audit your code

Programmer's Day: Resources to audit your code

Secure Coding

Programmer's Day: Resources to audit your code

Taking advantage of the celebration of the Day of the Programmer, we share some audit tools to evaluate the security of your code

Cecilia Pastorino13 Sep 2018


Secure Coding

Can cramming code with bugs make it more secure? Some think so

Can cramming code with bugs make it more secure? Some think so

Secure Coding

Can cramming code with bugs make it more secure? Some think so

Unbeknownst to exploit writers, the seemingly mouth-watering bugs would be bogus and non-exploitable

Tomáš Foltýn13 Aug 2018


Secure Coding

Five tips for pentesters in iOS

Five tips for pentesters in iOS

Secure Coding

Five tips for pentesters in iOS

Recommendations for pentesters looking for security flaws in iOS applications made by developers

Denise Giusto Bilić05 Jul 2018


Secure Coding

Open source code is ubiquitous and so are many vulnerabilities

Open source code is ubiquitous and so are many vulnerabilities

Secure Coding

Open source code is ubiquitous and so are many vulnerabilities

One-third of audited codebases that contain Apache Struts suffer from the same vulnerability that facilitated the Equifax hack a year ago

Tomáš Foltýn18 May 2018


Secure Coding

How well can bug hunting pay?

How well can bug hunting pay?

Secure Coding

How well can bug hunting pay?

In some countries, the financial allure of looking for security vulnerabilities is (even) more striking, according to the findings of a survey released recently by bug bounty platform provider HackerOne.

Tomáš Foltýn25 Jan 2018


Secure Coding

Black Hat: Hacking the firmware, the next frontier

Black Hat: Hacking the firmware, the next frontier

Secure Coding

Black Hat: Hacking the firmware, the next frontier

Trick the firmware and you have access to the whole system. Here at Black Hat, there are a lot of people doing just that.

Cameron Camp28 Jul 2017


Secure Coding

Some examples of vulnerable code and how to find them

Some examples of vulnerable code and how to find them

Secure Coding

Some examples of vulnerable code and how to find them

"When looking for vulnerabilities in open-source code, it is advisable to check portions of code that is prone to errors": Useful tips from one of ESET's malware analysts, Matías Porolli, on how to spot vulnerable code.

Matías Porolli30 Jan 2017


Secure Coding

How to isolate VBS or JScript malware with Visual Studio

How to isolate VBS or JScript malware with Visual Studio

Secure Coding

How to isolate VBS or JScript malware with Visual Studio

ESET has seen a rise in malware developed using scripting languages. We can understand the threats better by isolating them in a dynamic analysis environment.

Diego Perez11 Feb 2016