What are the security risks of iOS apps? While some alternative solutions make it more efficient for developers ito update their apps, they don't meet the strict security standards Apple has in place, which could lead to compromised code.Read more...
Entries filed under 'open source'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
July 25, 2012 6:53 PM By Chuck Willis
We are happy to announce the release of version 1.0 - the first major release - of the Open Web Application Security Project (OWASP) Broken Web Applications project Virtual Machine (VM). This open source project assembles and distributes a VM of web applications with a wide variety of security vulnerabilities. The VM is designed to appeal to a wide variety of audiences, including beginners looking to learn the basics of web application vulnerabilities, developers and testers who want to examine and correct the code that implements vulnerabilities, incident responders desiring to examine evidence of web application attacks in logs, and security professionals looking to test tools and techniques.Read more...
July 10, 2012 3:55 PM By Helena Brito
May 22, 2012 6:53 PM By Sean Cunningham
November 25, 2008 4:40 AM By Jamie Butler
Audit Viewer allows the incident responder or forensic analyst to quickly view complex XML output in an easily readable format. Using familiar grouping of data and search capabilities, Audit Viewer makes memory analysis quicker and more intuitive.Read more...