Web App Security

  • Most Topular Stories

  • Mozilla Winter of Security is back!

    Mozilla Security Blog
    Julien Vehent
    15 Jul 2015 | 12:18 pm
    Last year, we introduced the Mozilla Winter of Security (MWoS) to invite students to work on security projects with members of Mozilla’s security teams. Ten projects were proposed, and dozens of teams applied. A winter later, MWoS 2014 gave birth to exciting new technologies such as the SeaSponge Threat Modeling platform, the Masche memory scanning Go library, a Linux Audit plugin written in Go for integration in Heka, and a TLS Observatory. The first edition of MWoS was a success, and a lot of fun for students and mentors, so we decided to run it again this year. For the 2015 edition, we…
  • 2015 Black Hat, DEF CON, BSidesLV Survival Guide

    Liquidmatrix Security Digest
    Bill Brenner
    20 Jul 2015 | 4:57 am
    A couple weeks ago I wrote a post for veterans of so-called security summer camp, focusing on ways to get the most from it even if the mind has grown jaded. This week, I’m focusing on the newbies. Every year I try to offer some advice for people attending Black Hat, BSidesLV and DEF CON for the first time. As always, it’s based on my personal experience. Everyone is different, so please continue to seek advice from other conference veterans. What follows is your 2015 survival guide. I hope it helps. Tip 1: Don’t let the noise get to you Black Hat in particular is a noisy…
  • Adobe Flash Vulnerability CVE-2015-5119 analysis

    Zscaler Research
    rubin azad
    13 Jul 2015 | 2:01 pm
    With the leak of Hacking Team's data, the security industry came to learn about multiple new 0day vulnerabilities targeting Flash, Internet Explorer, Android, etc. As always, exploit kit authors were quick to incorporate these 0day exploits into their arsenal. In this blog, we will be looking at the CVE-2015-5119 exploit payload that we have now seen in the wild. The sample has multiple
  • Keyboard events in Firefox OS TV

    Mozilla Hacks - the Web developer blog
    Chun-Min Chang
    28 Jul 2015 | 1:01 pm
    Getting started The behavior of input events via hardware keys in Firefox OS varies widely from app to app. Early smartphones came with a limited number of keys — Power, Home, Volume up, Volume down — so it was easy for the software to determine an appropriate response for each keypress event. However, Smart TV remotes now come with many hardware keys, and defining the appropriate behavior when a key is pressed has become an important issue on the Firefox OS TV platform. If a hardware key on a smart remote can be used both by apps and by the system, it’s important to determine…
  • “Analysing Malicious Documents” Training At 44CON London

    Didier Stevens
    Didier Stevens
    21 Jul 2015 | 5:00 pm
    I’m teaching a 2-day class “Analysing Malicious Documents” at 44CON London. Here is my promo video:
  • add this feed to my.Alltop

    Mozilla Security Blog

  • Mozilla Winter of Security is back!

    Julien Vehent
    15 Jul 2015 | 12:18 pm
    Last year, we introduced the Mozilla Winter of Security (MWoS) to invite students to work on security projects with members of Mozilla’s security teams. Ten projects were proposed, and dozens of teams applied. A winter later, MWoS 2014 gave birth to exciting new technologies such as the SeaSponge Threat Modeling platform, the Masche memory scanning Go library, a Linux Audit plugin written in Go for integration in Heka, and a TLS Observatory. The first edition of MWoS was a success, and a lot of fun for students and mentors, so we decided to run it again this year. For the 2015 edition, we…
  • Dharma

    Christoph Diehl
    29 Jun 2015 | 10:54 am
    As soon as a developer at Mozilla starts integrating a new WebAPI feature, the Mozilla Security team begins working to help secure that API. Subtle programming mistakes in new code can introduce annoying crashes and even serious security vulnerabilities that can be triggered by malformed input which can lead to headaches for the user and security exposure. WebAPIs start life as a specification in the form of an Interface Description Language, or IDL. Since this is essentially a grammar, a grammar-based fuzzer becomes a valuable tool in finding security issues in new WebAPIs because it ensures…
  • Changes to the Firefox Bug Bounty Program

    rforbes
    9 Jun 2015 | 11:53 am
    The Bug Bounty Program is an important part of security here at Mozilla.  This program has paid out close to 1.6 million dollars to date and we are very happy with the success of it.  We have a great community of researchers who have really contributed to the security of Firefox and our other products. Those of us on the Bug Bounty Committee did an evaluation of the Firefox bug bounty program as it stands and decided it was time for a change. First, we looked at how much we award for a vulnerability.  The amount awarded was increased to $3000 five years ago and it is definitely time for…
  • MozDef: The Mozilla Defense Platform v1.9

    Jeff Bryner
    20 May 2015 | 3:26 pm
    At Mozilla we’ve been using The Mozilla Defense Platform (lovingly referred to as MozDef) for almost two years now and we are happy to release v1.9. If you are unfamiliar, MozDef is a Security Information and Event Management (SIEM) overlay for ElasticSearch. MozDef aims to bring real-time incident response and investigation to the defensive tool kits of security operations groups in the same way that Metasploit, LAIR and Armitage have revolutionized the capabilities of attackers. We use MozDef to ingest security events, alert us to security issues, investigate suspicious activities,…
  • May 2015 CA Communication

    kwilson
    12 May 2015 | 12:13 pm
    Mozilla has sent a Communication to the Certification Authorities (CAs) who have root certificates included in Mozilla’s program. Mozilla’s CA Certificate Program governs inclusion of root certificates in Network Security Services (NSS), a set of open source libraries designed to support cross-platform development of security-enabled client and server applications. The NSS root certificate store is not only used in Mozilla products such as the Firefox browser, but is also used by other companies in a variety of applications. The CA Communication has been emailed to the Primary Point of…
 
  • add this feed to my.Alltop

    Liquidmatrix Security Digest

  • 2015 Black Hat, DEF CON, BSidesLV Survival Guide

    Bill Brenner
    20 Jul 2015 | 4:57 am
    A couple weeks ago I wrote a post for veterans of so-called security summer camp, focusing on ways to get the most from it even if the mind has grown jaded. This week, I’m focusing on the newbies. Every year I try to offer some advice for people attending Black Hat, BSidesLV and DEF CON for the first time. As always, it’s based on my personal experience. Everyone is different, so please continue to seek advice from other conference veterans. What follows is your 2015 survival guide. I hope it helps. Tip 1: Don’t let the noise get to you Black Hat in particular is a noisy…
  • A “Faces Of DEF CON” Clique?

    Bill Brenner
    15 Jul 2015 | 5:25 am
    Recently on Twitter, infosec pro Marcus Carey voiced his dislike for all the “Faces of DEF CON” avatars people are using. Specifically, he said every time he sees one he wants to unfollow the person. Asked why, he opined that it was “infosec clique culture at its finest.” I responded that I was keeping my own avatar and that he could go ahead and unfollow me. It was an honor to be included in the “Faces of DEF CON” series by artist and fellow infosec pro Eddie “EddieTheYeti” Mize, I told him. He unfollowed me (he later re-followed) and asked…
  • Liquidmatrix Reflections

    Dave Lewis
    10 Jul 2015 | 2:40 pm
    I found myself sitting in a hotel room in some random city recently with a glass of wine, several open powerpoint decks and Family Guy on the television. A moment of reflection if ever there was one. It occurred to me that Liquidmatrix just had it’s 17th birthday this past February. That is a helluva long time for a website of any description. It has been a lot of fun to see the site grow from an insanely (ugly) basic HTML site to a heavily trafficked site with multiple members either writing and podcasting. I’ve been making a lot of architectural changes to the site and now, I’m…
  • 4 Tips for Jaded Black Hat/DEF CON Attendees

    Bill Brenner
    9 Jul 2015 | 11:33 am
    Soon, in various publications, articles will appear with advice for folks attending Black Hat and DEF CON for the first time. Advice for newbies is important, and I’ve written my own survival guide for that over the years. But for this post, I’m speaking to the battle-hardened veterans who have made the journey repeatedly over the years. Having attended too many of these to count, I consider myself a veteran. Or, to put it another way, I consider myself among the jaded. “Jaded” is a negative word. It’s typically used to describe someone who is burned out and no longer impressed with…
  • Stepto Rising

    Bill Brenner
    15 Jun 2015 | 5:05 am
    Like many of you, I was shocked last week to hear that Stephen “Jamie” Toulouse (@Stepto) had fallen into a deep coma. Family members took to social media to say that his prognosis wasn’t looking good; that he wasn’t expected to survive. But thanks to excellent medical care, prayer and what is surely a strong will to live, Stepto — director of hacker success at HackerOne — seems to have made it through the storm. Saturday, his family posted an update saying he was awake and breathing without help from a tube. “Although he is very weak, he has been…
  • add this feed to my.Alltop

    Zscaler Research

  • Adobe Flash Vulnerability CVE-2015-5119 analysis

    rubin azad
    13 Jul 2015 | 2:01 pm
    With the leak of Hacking Team's data, the security industry came to learn about multiple new 0day vulnerabilities targeting Flash, Internet Explorer, Android, etc. As always, exploit kit authors were quick to incorporate these 0day exploits into their arsenal. In this blog, we will be looking at the CVE-2015-5119 exploit payload that we have now seen in the wild. The sample has multiple
  • Hacking Team leak, Flash 0day, exploit payloads and more

    Deepen Desai
    8 Jul 2015 | 2:27 pm
    [Update - July 13, 2015] In addition to the Flash 0day exploit that we reported earlier [CVE-2015-5119], two new Flash 0day exploits were found in the Hacking Team's leaked data and these flaws are not yet patched: CVE-2015-5122: valueOf use after free vulnerability during the assignment to freed TextBox Two in-the-wild samples reported here 31d03169b9742a0ff04e3d24bb448bbf
  • Fake BatteryBotPro ClickFraud, AdFraud, SMS & Downloader Trojan

    Shivang Desai
    6 Jul 2015 | 11:00 am
    [UPDATE #1 - July 8, 2015] We would like to clarify that at the time of our analysis, the app was not present on the Google Store. We found references to this fake app being hosted on the Google Play store during our research where it showed that the App has been removed from the Google Play store already as seen below: Link to Google Play Store for the fake app ..... [UPDATE #2 - July 9,
  • A look at recent Tinba Banking Trojan variant

    Dhanalakshmi Pk
    5 Jul 2015 | 10:59 pm
    Introduction  Tinba is information stealing Trojan. The main purpose of the malware is to steal information that could be browsing data, login credentials, or even banking information. This is achieved through code injection into system process (Winver.exe and Explorer.exe) and installing hooks into various browsers like IExplorer, Chrome, Firefox and Opera. Tinba has been known to arrive via
  • Potentially Painful Programs Promising Pirated Products

    Chris Mannon
    26 Jun 2015 | 3:46 pm
    A major source of PC compromise doesn't come from targeted APT campaigns or Exploit Kits, but user's clicking things that they simply shouldn't. A common practice for adware and spyware writers is hosting large numbers of seemingly legitimate files that users might trust from an unknown source. Users know trusted download locations for common packages like Flash Player or Skype, but when
 
  • add this feed to my.Alltop

    Mozilla Hacks - the Web developer blog

  • Keyboard events in Firefox OS TV

    Chun-Min Chang
    28 Jul 2015 | 1:01 pm
    Getting started The behavior of input events via hardware keys in Firefox OS varies widely from app to app. Early smartphones came with a limited number of keys — Power, Home, Volume up, Volume down — so it was easy for the software to determine an appropriate response for each keypress event. However, Smart TV remotes now come with many hardware keys, and defining the appropriate behavior when a key is pressed has become an important issue on the Firefox OS TV platform. If a hardware key on a smart remote can be used both by apps and by the system, it’s important to determine…
  • ES6 In Depth: Classes

    Eric Faust
    22 Jul 2015 | 12:42 pm
    ES6 In Depth is a series on new features being added to the JavaScript programming language in the 6th Edition of the ECMAScript standard, ES6 for short. Today, we get a bit of a respite from the complexity that we’ve seen in previous posts in this series. There are no new never-before-seen ways of writing code with Generators; no all-powerful Proxy objects which provide hooks into the inner algorithmic workings of the JavaScript language; no new data structures that obviate the need for roll-your-own solutions. Instead, we get to talk about syntactic and idiomatic cleanups for an old…
  • ES6 In Depth: Proxies

    Jason Orendorff
    17 Jul 2015 | 1:43 pm
    ES6 In Depth is a series on new features being added to the JavaScript programming language in the 6th Edition of the ECMAScript standard, ES6 for short. Here is the sort of thing we are going to do today. var obj = new Proxy({}, { get: function (target, key, receiver) { console.log(`getting ${key}!`); return Reflect.get(target, key, receiver); }, set: function (target, key, value, receiver) { console.log(`setting ${key}!`); return Reflect.set(target, key, value, receiver); } }); That’s a little complicated for a first example. I’ll explain all the parts later. For now, check out the…
  • ES6 In Depth: Generators, continued

    Jason Orendorff
    9 Jul 2015 | 3:38 pm
    ES6 In Depth is a series on new features being added to the JavaScript programming language in the 6th Edition of the ECMAScript standard, ES6 for short. Welcome back to ES6 In Depth! I hope you had as much fun as I did during our summer break. But the life of a programmer cannot be all fireworks and lemonade. It’s time to pick up where we left off—and I’ve got the perfect topic to resume with. Back in May, I wrote about generators, a new kind of function introduced in ES6. I called them the most magical feature in ES6. I talked about how they might be the future of asynchronous…
  • Developer Edition 41: View source in a tab, screenshot elements, HAR files, and more

    Jeff Griffiths
    7 Jul 2015 | 10:39 am
    When we introduced the new Performance tools a few weeks ago, we also talked about how the Firefox Dev Tools team had spent a lot of time focusing on user feedback and what we call ‘polish’ bugs – things reported via our UserVoice feedback channel and Bugzilla. Even though the Firefox 41 was a short release cycle for us, this focus on user feedback continues to pay off — several new features that our community had been asking for landed in time for the release. Here’s a closer look: Screenshot the selected node in the Inspector New contributor Léon McGregor…
  • add this feed to my.Alltop

    Didier Stevens

  • “Analysing Malicious Documents” Training At 44CON London

    Didier Stevens
    21 Jul 2015 | 5:00 pm
    I’m teaching a 2-day class “Analysing Malicious Documents” at 44CON London. Here is my promo video:
  • If You Have A Problem Running My Tools

    Didier Stevens
    19 Jul 2015 | 5:00 pm
    If you get an error running one of my tools, first make sure you have the latest version. Many tools have a dedicated page, but even more tools have no dedicated page but a few blogposts. Check “My Software” list for the latest versions. Most of my tools are written in Python or C. Almost all of my Python tools are written for Python 2 and not Python 3. My PDF tools pdfid and pdf-parser are an exception: they are designed to run with Python 2 and Python 3. If you get a syntax error running one of my Python tools, then it’s most likely that you are using Python 3 with a tool…
  • Extracting Dyre Configuration From A Process Dump

    Didier Stevens
    12 Jul 2015 | 5:00 pm
    There are a couple of scripts and programs available on the Internet to extract the configuration of the Dyre banking malware from a memory dump. What I’m showing here is a method using a generic regular expression tool I developed (re-search). Here is the Dyre configuration extracted from the strings found inside the memory dump: I want to produce a list of the domains found as first item in an <litem> element. re-search is a bit like grep -o, it doesn’t select lines but it selects matches of the provided regular expression. Here I’m looking for tag <litem>: By…
  • base64dump.py Version 0.0.1

    Didier Stevens
    5 Jul 2015 | 7:54 am
    A new tool, a new video: base64dump_V0_0_1.zip (https) MD5: 350C12F677E08030E0DD95339AC3604D SHA256: 1F8156B43C8B52B7E5620B7A8CD19CFB48F42972E8625994603DDA47E07C9B35
  • Update: oledump.py Version 0.0.17 – ExitCode

    Didier Stevens
    26 Jun 2015 | 2:44 am
    Here is a new version of oledump with a couple of bugfixes and a new feature: ExitCode. The ExitCode of the Python program running oledump.py is 0, except if the analyzed file contains macros, then it is 1. You can’t use options if you want the ExitCode. Thanks Philippe for the idea. oledump_V0_0_17.zip (https) MD5: 5AF76C638AA300F6703C6913F80C061F SHA256: A04DDE83621770BCD96D622C7B57C424E109949FD5EE2523987F30A34FD319E1
 
  • add this feed to my.Alltop

    CERIAS Combined Feed

  • Dissecting Obama’s CyberSecurity Executive Order

    CERIAS Webmaster
    16 Jul 2015 | 1:20 pm
    CipherCloud’s Dr. Chenxi Wang interviewed Dr. Eugene Spafford, the executive director of CERIAS center, Purdue University. Below is a summary of the interview conversation. More information »
  • Reframing What We Think We Know About Privacy and Risk (Pt. 2)

    CERIAS Webmaster
    25 Jun 2015 | 1:49 pm
    More information »
  • The Intersection Between Privacy and Risk Communication and InfoSec

    CERIAS Webmaster
    19 Jun 2015 | 7:26 am
    CERIAS Ph.D. candidate, Kelley Misata, spoke with SecurityIntelligence.com the topics of privacy and risk management communication. More information »
  • Proposed Changes in Export Control

    Gene Spafford
    11 Jun 2015 | 11:15 pm
    The U.S. limits the export of certain high-tech items that might be used inappropriately (from the government’s point of view). This is intended to prevent (or slow) the spread of technologies that could be used in weapons, used in hostile intelligence operations, or used against a population in violation of their rights. Some are obvious, such as nuclear weapons technology and armor piercing shells. Others are clear after some thought, such as missile guidance software and hardware, and stealth coatings. Some are not immediately clear at all, and may have some benign civilian uses too,…
  • Déjà Vu All Over Again: The Attack on Encryption

    Gene Spafford
    6 Jun 2015 | 9:32 am
    Preface by Spaf Chair, ACM US Public Policy Council (USACM) About 20 years ago, there was a heated debate in the US about giving the government mandatory access to encrypted content via mandatory key escrow. The FBI and other government officials predicted all sorts of gloom and doom if it didn’t happen, including that it would prevent them from fighting crime, especially terrorists, child pornographers, and drug dealers. Various attempts were made to legislate access, including forced key escrow encryption (the “Clipper Chip”). Those efforts didn’t come to pass because eventually…
  • add this feed to my.Alltop

    Security Bloggers Network

  • Big Brother(s) Could be Watching You Thanks to Stagefright  

    Filip Chytry
    29 Jul 2015 | 9:03 am
    Earlier this week, security researchers unveiled a vulnerability that is believed to be the worst Android vulnerability yet discovered. The “Stagefright” bug exposes nearly 1 billion Android devices to malware. The vulnerability was found in “Stagefright”, an Android media library. Hackers can gain access to a device by exploiting the vulnerability and can then access […]
  • Endpoint Exploitation Trends (but what of Hacking Team!?)

    clintonkarr
    29 Jul 2015 | 9:00 am
    Today, Bromium released “Endpoint Exploitation Trends 1H 2015,” a Bromium Labs threat report that analyzes security trends from the first six months of 2015. One of the primary themes to emerge from the report should come as no surprise: cyber criminals are attacking targets that have the most users. Pragmatically, this means that malvertising campaigns […]
  • United Airlines Reportedly Breached by OPM, Anthem Hackers

    Maritza Santillan
    29 Jul 2015 | 8:47 am
    The hackers allegedly responsible for the massive breaches at the U.S. Office of Personnel Management and insurance giant Anthem appear to have also hacked United Airlines, Bloomberg reported. According to several sources familiar with the incident, the intrusion into its computer systems was detected by the airline back in May or early June. “Investigators working […]… Read More The post United Airlines Reportedly Breached by OPM, Anthem Hackers appeared first on The State of Security.
  • Children should have the right to be forgotten, says iRights campaign

    Lee Munson
    29 Jul 2015 | 8:38 am
    A new children's privacy rights campaign has attracted backing from ministers, business leaders and academics.
  • NSA sets date for purge of surveillance phone records

    Frantz Desir
    29 Jul 2015 | 8:25 am
    A posting from NakedSecurity titled “NSA sets date for purge of surveillance phone records ” by  Lisa Vaas  The National Security Agency (NSA) has set a date to purge phone records collected during its bulk surveillance program. “Analytic access” to the five years worth of records will end on 29 November, and they’ll be destroyed […] The post NSA sets date for purge of surveillance phone records appeared first on SecurityOrb.com.
  • add this feed to my.Alltop

    blog.hotspotshield.com

  • Keyless, Wireless Home Door Locks: An Open Invitation for Thefts?

    Levent Sapci
    27 Jul 2015 | 3:13 pm
    Keyless locks are the wave of the future for home improvement and security, but these novel inventions leave a lot of questions. Are wireless home door locks really more secure than a traditional lock and key, or do they actually create a new vulnerability by opening your home to criminals with more brains than brawn to intrude via a hack than use physical force? How Keyless Door Locks Work Keyless door locks can work in different ways, giving homeowners ample choices in this area. UniKey uses a unique transaction between your phone and the lock and relies on a public-key infrastructure to…
  • Save Money on Your Next Online Shopping Spree

    Levent Sapci
    22 Jul 2015 | 6:22 pm
    Online stores in the United States have some of the largest and best selections on the web, so it’s little wonder that they attract shoppers from all over the world. The only problem is that these sites don’t show the same products and prices to all visitors. The prices and products online retailers show you depend on your IP address, which reveals your general geographic location. That’s right: Your IP address can result in higher prices and limited access to certain products. Fortunately, there is a way around this geo-discrimination that is simple, fast, and free. Read on…
  • Access Desi Content Online!

    Mehreen Seher
    15 Jul 2015 | 3:24 pm
    Stuck indoors because of the summer heat? That can become boring quickly, can’t it? Well we’ve got some fun solutions for you! Using Hotspot Shield, you can unblock some awesome Pakistani and Indian content online that you and your family can enjoy together! Discover new Pakistani and Indian tunes on Pandora Have you heard of Pandora? It’s a free music streaming and personalized radio service, that’s great for discovering new music that you’re bound to love. It asks you for your favorite music artists and then generates a radio station full of songs like the ones you love. It’s a…
  • Unblock the Most Popular Video Games from Any Country

    Levent Sapci
    15 Jul 2015 | 12:33 pm
    Video games have been igniting controversy almost as long as they’ve existed. Censors regularly ban games in certain countries due to objectionable content, but rarely is a game banned everywhere. That means that your IP address can determine whether you have access to some of the web’s hottest games. If it doesn’t seem fair to you that you can’t play a game because of where you live, we can help. Read on for a list of seven popular games that some countries have banned and how you can play them. Mortal Kombat X ($59.99) The Mortal Kombat series of games has sparked…
  • Watch ‘Humans’ TV Show Without Cable and Ahead of Your Friends

    Jeanette
    13 Jul 2015 | 5:36 pm
    Channel 4’s biggest hit in over a decade, Humans is a new sci-fi dystopian drama that’s more human than ever. In the not-so-distant future, the new hot tech to have is a humanoid robot (called a synth in the show)  to serve as a caregiver, housekeeper, and gopher—a TaskRabbit IRL. However, as history dictates, conscious beings tend to evolve, and as the show will have it, the robots start to exhibit sentient and human emotions and desire equal rights and treatment to humans. Sure it kind of sounds like the plot of iRobot, but it’s so much more! Where Humans excel is exploring the…
 
  • add this feed to my.Alltop

    Quotium

  • Synopsys Completes Acquisition of Seeker from Quotium

    Quotium Research Center
    21 Jul 2015 | 7:06 am
    Synopsys, Inc. has completed its acquisition of certain assets of Quotium, including the Seeker® product and R&D team. The asset acquisition adds talent and technology that will accelerate Synopsys’ efforts in the software application security market and extend the company’s Coverity® platform with interactive application security testing (IAST) functionality. The post Synopsys Completes Acquisition of Seeker from Quotium appeared first on www.quotium.com
  • QUOTIUM TECHNOLOGIES to sell its Application and Data Security Solutions to SYNOPSYS

    Quotium Research Center
    29 May 2015 | 6:46 am
    Quotium Technologies (NYSE Euronext: QTE) has signed with Synopsys, Inc. (Nasdaq: SNPS) an agreement to sell all its assets related to its application and data security technologies including Seeker® software products. The post QUOTIUM TECHNOLOGIES to sell its Application and Data Security Solutions to SYNOPSYS appeared first on www.quotium.com
  • Video

    irene
    27 Jan 2015 | 7:28 am
    The post Video appeared first on www.quotium.com
  • Hackers are evolving – 2015 version – History of Internet and Application Security

    irene
    26 Jan 2015 | 6:14 am
    Hackers are Evolving, your Application Security Must Evolve too : Don’t be the Hacker’s Next Lunch ! Our timeline about Internet history and Evolution of Application Security - updated with a summary of 2014's hacking events. The post Hackers are evolving – 2015 version – History of Internet and Application Security appeared first on www.quotium.com
  • Quotium named as a leader in Application Security by Independent research firm

    irene
    10 Jan 2015 | 12:42 am
    According to the study, Quotium “is an ideal product for enterprises looking for simultaneous testing across a multitude of users and servers, with a centralized repository in various test environments” The post Quotium named as a leader in Application Security by Independent research firm appeared first on www.quotium.com
Log in