IT Security Expert Blog

A UK view on Cybersecurity & Information Security, Everything Computer Security from the very basics to the advanced. A blog with a focus on the latest Cyber Security developments & issues in the UK, including Hacking, Privacy (GDPR), Data Breaches, security standards such as NIST, PCI DSS, Cyber Essentials & ISO27001, all will be simply explained.

Tuesday, 12 December 2017

Scan your app to find and fix OWASP Top 10 - 2017 vulnerabilities

Following the updated release of OWASP Top Ten (2017), I have updated my IBM developerWorks article "Scan your app to find and fix OWASP Top 10 - 2017 vulnerabilities", which was released on the IBM Developer Works website today
Posted by SecurityExpert at 23:30 No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: application security, ibm, OWASP
Newer Posts Older Posts Home
View mobile version
Subscribe to: Posts (Atom)
Click here for the IT Security Expert Website
Part of the

Cyber Security Expert Website

Tweets by @SecurityExpert Dave Whitelegg Media Info

Subscribe to

Posts
Atom
Posts
All Comments
Atom
All Comments

Search IT Security Expert Blog

Blog archive

  • ►  2021 (3)
    • ►  January (3)
  • ►  2020 (49)
    • ►  December (7)
    • ►  November (6)
    • ►  October (2)
    • ►  September (3)
    • ►  August (5)
    • ►  July (6)
    • ►  June (2)
    • ►  May (2)
    • ►  April (4)
    • ►  March (5)
    • ►  February (3)
    • ►  January (4)
  • ►  2019 (76)
    • ►  December (9)
    • ►  November (17)
    • ►  October (7)
    • ►  September (2)
    • ►  August (1)
    • ►  July (3)
    • ►  June (5)
    • ►  May (9)
    • ►  April (3)
    • ►  March (4)
    • ►  February (6)
    • ►  January (10)
  • ►  2018 (27)
    • ►  December (3)
    • ►  November (3)
    • ►  October (2)
    • ►  September (4)
    • ►  August (1)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  March (2)
    • ►  February (3)
    • ►  January (3)
  • ▼  2017 (38)
    • ▼  December (1)
      • Scan your app to find and fix OWASP Top 10 - 2017 ...
    • ►  November (2)
    • ►  October (3)
    • ►  September (7)
    • ►  August (4)
    • ►  June (5)
    • ►  May (5)
    • ►  April (3)
    • ►  March (3)
    • ►  February (2)
    • ►  January (3)
  • ►  2016 (23)
    • ►  December (4)
    • ►  November (4)
    • ►  October (2)
    • ►  September (4)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2015 (12)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  June (3)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2014 (21)
    • ►  November (1)
    • ►  September (2)
    • ►  July (2)
    • ►  June (4)
    • ►  May (1)
    • ►  April (2)
    • ►  March (3)
    • ►  February (4)
    • ►  January (2)
  • ►  2013 (33)
    • ►  December (1)
    • ►  October (4)
    • ►  September (6)
    • ►  August (6)
    • ►  July (3)
    • ►  June (4)
    • ►  May (1)
    • ►  April (2)
    • ►  March (2)
    • ►  February (2)
    • ►  January (2)
  • ►  2012 (32)
    • ►  December (2)
    • ►  November (5)
    • ►  October (5)
    • ►  September (1)
    • ►  August (13)
    • ►  July (2)
    • ►  June (2)
    • ►  March (1)
    • ►  January (1)
  • ►  2011 (14)
    • ►  November (1)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2010 (18)
    • ►  November (1)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  July (1)
    • ►  May (1)
    • ►  April (3)
    • ►  March (3)
    • ►  February (3)
    • ►  January (1)
  • ►  2009 (29)
    • ►  December (1)
    • ►  November (3)
    • ►  October (2)
    • ►  August (1)
    • ►  July (4)
    • ►  June (3)
    • ►  May (1)
    • ►  April (2)
    • ►  March (4)
    • ►  February (4)
    • ►  January (4)
  • ►  2008 (26)
    • ►  December (3)
    • ►  November (2)
    • ►  October (3)
    • ►  September (2)
    • ►  July (2)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  March (4)
    • ►  February (1)
    • ►  January (4)
  • ►  2007 (60)
    • ►  December (6)
    • ►  November (14)
    • ►  October (4)
    • ►  September (8)
    • ►  August (6)
    • ►  July (6)
    • ►  June (9)
    • ►  May (7)

Post Categories

data breach Data Protection Patching cyber security roundup Home Security ransomware Hacking Security Awareness Microsoft privacy PCI DSS GDPR NCSC malware Payment Card Fraud password security Encryption nation-state hackers DPA DDoS ICO ID Theft Cloud Security adobe iot Cyber Crime web application security Threat Huawei Cyberwar COVID-19 Wifi Security cyber phishing Mobile Security Social Media facebook yahoo talktalk wannacry Cisco Network Security application security British Airways CISO Coronavirus Fraud RSAC Risk Management cybersecurity ibm Apple Vulnerability Management amazon brexit cybercrime Snowden dark web football infographic marriott nhs Big Data Intel OWASP Policies Third Party Security Twitter AI APT10 GCHQ MFA NSA Terrorism aws cryptocurrencies incident management ryuk 5G APT28 BEC Insider Threat Magecart Manchester City anti-virus enterprise security equifax podcast scam small business Apache Compliance Cyber Essentials bitcoin data retension email security kaspersky petya vpn A10 Networks CCTV Car Security Cobalt Conference Cryptojacking DLP Emotet FCA Hacktivism Meltdown Mirai Mitre Physical Security SME Trickbot Uber Windows XP appscan artificial intelligence bluekeep botnets career ceo fraud credential stuffing cyber insurance firewall mcafee misconfiguration ring sans supply-chain threat hunting training travelex zoom APT29 BYOD Currys DBIR Deep Secure Dixons carphone FBI Google Hack Heartbleed IAM InfoSec Maze NIST O365 PewDiePie RSA SHA-1 Sophos Spectre T-Mobile VMware Windows 7 Windows Server 2018 access control becrypt book review bsides bt carbon black digital transformation dixons fireeye labour party lenovo logmeonce management piracy pitney bowes sextortion social engineering solarwinds starwood sunburst tor whatsapp 2018 AMD APT1 APT3 APT37 APT38 APT39 APT40 APTC23 ATP Aebi Schmidt Azure CCISO CCPA CEH CESG CISA CISM CISSP CREST CVSS CeX Citrix Coalfire Cognizant CompTIA Crime Dot Com Cyber Bullying Cyber Security Challenge UK Decathlon Defcon Disaster Recovery as a Service Disney ECSC Enterprise Europe Network European Cyber Security Challenge F5 FASTR FFA FIFA Flightradar Gaming Github HCSEC HSBC IOC ISACA ISC2 ISCN ISO27001 Identity Theft Intelligencia Krack Kraken KwikFit LOC Liverpool MH370 ML Maersk Memty NASA NCC Netscout Nintendo Nokia Nominet PC World PoisonTap PokemonGo RAA Redcar Regenix Revil SIGRed SOAR Security Today Sentinel Snake Sodinokibi Steganography TA505 TGI Friday UEFA VIPRE Verizon Vision Direct Windows 10 YesWeHack Zero Trust Zerologon adware att&ck awards beyer biometrics bitdefender bitsight black friday blockchain blueborne boothole bugbounty china christmas cloud security alliance contactless corvid cyber risk cyberis darkgate data classification defender deltacharlie disaster recovery dropbox drown e-crime congress easyjet education email end point security eternalblue f-secure fedex films flashpoint goldenspy greene king hacker hidden cobra ignite iloveyou imperva iphone isame isf legal sector locky lovebug moneytaker movies mumsnet netflix nordVPN notpetya outpost24 oyster paradox plundervolt rbs retail shadow IT shlayer smart cities snapchat sonos spotify spyware stuxnet superfish telegram teletext holidays tfl threat intelligence threatQ ticketmaster timehop undervolting wearables winzip zavvi zero-day

Last 12 Months Most Popular Posts

  • Lush Credit Card Data Breach
    Before I go into my thoughts on the recent Lush website credit card data breach, I have some important advice to all Lush online customers. ...
  • The Billion Pound Manchester City Hack
    The sport of football is a multi-billion-pound global industry, where the world's top-drawer football clubs push competitive advantages ...
  • Is Huawei a Threat to UK National Security?
    On 19th July 2018 the UK government, through the GCHQ backed Huawei Cyber Security Evaluation Centre , gave “limited assurance” that Huawei...
  • Facebook Live Oyster Pearl Party Scams
    A little off-topic but recently I've been asked so many times about the Pearl Parties live broadcasts appearing all over Facebook status...
  • Passwords are and have always been an Achilles Heel in CyberSecurity
    LogMeOnce , a password identity management suite provider, has published a detailed interview with myself titled ' Passwords are and hav...
  • Twitter Hack & Scam
    What Happened? Twitter confirmed 130 celebrity Twitter accounts were targeted in the cyberattack  on Wednesday 15th July, with 45 successful...
  • WinZip Encryption Password Security
    Post Updated - See  WinZip Encryption Password Security (2017) Recently I have received several Emails asking about WinZip encryption, and...
  • Cyber Security Roundup for June 2020
    A roundup of UK focused Cyber and Information Security News, Blog Posts, Reports and general Threat Intelligence from the previous calendar ...

Cyber Security News Stream

Tweets by @SecurityToday
4D Cyber Security Awards 2019

Other Security Blogs

  • Help Net Security - News
    McAfee launches cloud-native MVISION XDR to optimize threat detection and response - McAfee announced the general availability of MVISION Extended Detection and Response (XDR) with inclusion of cloud, and network telemetry, unifying and o...
    4 hours ago
  • Schneier on Security
    Police Have Disrupted the Emotet Botnet - A coordinated effort has captured the command-and-control servers of the Emotet botnet: Emotet establishes a backdoor onto Windows computer systems via a...
    4 hours ago
  • Krebs on Security
    Arrest, Seizures Tied to Netwalker Ransomware - U.S. and Bulgarian authorities this week seized the darkweb site used by the NetWalker ransomware cybercrime group to publish data stolen from its victims....
    17 hours ago
  • Microsoft Security
    The state of apps by Microsoft identity: Azure AD app gallery apps that made the most impact in 2020 - See what applications in the Azure AD app gallery powered the way we work, learn, and collaborate in 2020. The post The state of apps by Microsoft identi...
    22 hours ago
  • AWS Security Blog
    AWS is the first global cloud service provider to comply with the new K-ISMS-P standard - We’re excited to announce that Amazon Web Services (AWS) has achieved certification under the Korea-Personal Information & Information Security Management ...
    2 days ago
  • Google Online Security Blog
    New Year, new password protections in Chrome - Posted by Ali Sarraf, Product Manager, Chrome Passwords help protect our online information, which is why it’s never been more important to keep them safe....
    1 week ago
  • SpiderLabs Blog from Trustwave
    Patch Tuesday, January 2021 - The first Patch Tuesday of 2021 is here and the year is starting out lighter than most. Perhaps a blessing for a year that doesn't seem to want to let up o...
    2 weeks ago

About Me

SecurityExpert
View my complete profile

ShareThis

Disclaimer

This is a personal website, all views or opinions represented in this blog are personal to Dave Whitelegg and guest bloggers that post, and do not represent the views or opinions of any business or organisation. All content provided on this blog is for informational purposes only. The owner of this blog makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. The owner will not be liable for any errors or omissions in this information nor for the availability of this information.
All original content copyright David Whitelegg 2007-2020. You may not use any original content with. Awesome Inc. theme. Powered by Blogger.