Java Security

Java security news, information, and how-to-advice

4tb drive
aukey dashcam

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

escape tool

24% off Resqme Keychain Car Escape Tool 2-Pack - Deal Alert

Made in the USA and originally developed for first responders, this 2-in-1 safety and survival tool features a blade for cutting a seatbelt and a spring-loaded steel spike for breaking a side window. Keep in on your keychain, or clip...

panda security

55% off Panda Security Ransomware and Virus Protection Products for Home Users - Deal Alert

Panda security solutions will fully protect you against the newly released malware and ransomware attacks, and Panda is offering 55% off all security products for home users using this special code at checkout.

future what is next

11 technologies developers should explore now

From machine learning to digital twins, opportunities abound in emerging (and converging) tech trends

Zombie Cloud Data

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy

surge protector

14% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest - Deal Alert

Be it a lightning strike that destroys a home entertainment center or fluctuating power that degrades the life of your electronics – surges, lightning, and power disturbances can have a devastating impact on the valuable electronics...

solar security light

36% off Litom Solar Outdoor Motion Sensor Security Lights, 2 Pack - Deal Alert

This Amazon #1 best selling solar security light is super bright and easy to install wherever you need it. It's highly rated, and a 2-pack is currently being offered at a 36% discount.

certifications certified certificate

Trust issues: Know the limits of SSL certificates

All SSL certs are not created equal, and web browsers make matters worse by not clearly showing what security you’re actually getting

elctrical plug shock

Jenkins users can shore up software security with plugins

Safeguard the software you develop from the start with these Jenkins plug-ins and integrations, which automate security testing

code programming software bugs cybersecurity

Open-source developers targeted in sophisticated malware attack

Developers who publish their code on GitHub have been targeted in an attack campaign that uses a little known but potent cyberespionage malware.

3 outlet plug

46% off CyberPower Surge Protector 3-AC Outlet with 2 USB (2.1A) Charging Ports - Deal Alert

This compact surge protector provides 600 joules of protection, 3 outlets, and a folding wall tap plug. Two USB ports (2.1 Amp) charge personal electronics, including smartphones, digital cameras, MP3 players, and other devices.

alert blur

Critical flaw alert! Stop using JSON encryption

Developers shouldn't use JSON Web Tokens or JSON Web Encryption in their applications at all, lest their private keys get stolen

high priority sign arrow

Oracle sets priorities for Java 9 bug fixes

Speeding toward the Java 9 release date, Oracle will address only the highest priority bugs before July 27

cloud security

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure

code programming software bugs cybersecurity

Hackers exploit Apache Struts vulnerability to compromise corporate web servers

Attackers are widely exploiting a recently patched vulnerability in Apache Struts that allows them to remotely execute malicious code on web servers.

code big data binary programming

Java and Python FTP attacks can punch holes through firewalls

The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks

red blue tools

5 open source security tools too good to ignore

Look to these clever open source tools to keep secrets out of source code, identify malicious files, block malicious processes, and keep endpoints safe

petya ransomware logo

Experts worried about ransomware hitting critical infrastructure

Ransomware is capable of shutting down computer systems that manage public utilities and private industry--experts say it's only a matter of when

Load More