The new series of articles "Secure Coding" provides a comprehensive guide to secure programming practices – specifically tailored to Java developers. In today's digital landscape, security is more ...
The article Secure Coding: Preventing unauthorized access through path traversal (CWE-22) has already described the dangers posed by the critical vulnerability CWE-22 (path traversal) in software ...
Make Java security a top priority at every stage of application development, from class-level language features to API endpoint authorization Security is one of the most complex, broad, and important ...
One of the most common problems identified by static code analysis tools is the presence of plain text passwords written directly into configuration files. It's ...
Logging and exception handling are like two peas in a pod. When a problem happens in your Java code, that typically means you have an exception that needs to be ...
When you’re trying to analyze why a program failed, a very valuable piece of information is what the program was actually doing when it failed. In many cases, this can be determined with a stack trace ...
News about a critical vulnerability in the Apache Log4j logging library broke last week when proof-of-concept exploits started to emerge on Thursday. Log4j is an open-source Java logging framework ...
We recently asked security maven Steve Orrin to tell us some of the tenets of secure coding today. While this was once an administrator's main look-see, it has become part of the developer's job in ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results