Bank Attackers More Sophisticated Than Typical Hacktivists, Expert Says

By Ali Loney on September 28, 2012 News

1 minute read time

Bank Attackers More Sophisticated Than Typical Hacktivists, Expert Says
Read More...

Expert Finds XSS Flaw On eBay After Bypassing 'Filtering Mechanisms'

By Ali Loney on September 28, 2012 News

1 minute read time

Expert Finds XSS Flaw On eBay After Bypassing 'Filtering Mechanisms'
Read More...

Cyber Era Brings New Kinds Of Supply-chain Threats

By Ali Loney on September 27, 2012 News

29 second read time

Cyber Era Brings New Kinds Of Supply-chain Threats
Read More...

Building Android Malware Is Trivial With Available Tools

By Ali Loney on September 27, 2012 Application Security

28 second read time

Building Android Malware Is Trivial With Available Tools
Read More...

Up Next: Nexus Support for Yum Repositories

By Jason van Zyl on September 27, 2012 Nexus Repo Reel

3 minute read time

Up Next: Nexus Support for Yum Repositories
Read More...

That's Billion with a B: Is Java Having an "Outlook" Moment?

By Tim OBrien on September 26, 2012 Sonatype Says

3 minute read time

That's Billion with a B: Is Java Having an Outlook Moment?
Read More...

Backdoor In phpMyAdmin Allows Hackers To Execute PHP Code

By Ali Loney on September 25, 2012 News

29 second read time

Backdoor In phpMyAdmin Allows Hackers To Execute PHP Code
Read More...

One Billion Users Affected By Java Security Sandbox Bypass Vulnerability, Experts Say

By Ali Loney on September 25, 2012 component vulnerabilities

1 minute read time

One Billion Users Affected By Java Security Sandbox Bypass Vulnerability, Experts Say
Read More...

JPMorgan Chase Bank Servers Hacked, Tiffany Employee Details Exposed

By Ali Loney on September 25, 2012 News

1 minute read time

JPMorgan Chase Bank Servers Hacked, Tiffany Employee Details Exposed
Read More...

The Cloud is Running toward BSD-style Licenses, are you?

By Tim OBrien on September 24, 2012 AppSec

5 minute read time

The Cloud is Running toward BSD-style Licenses, are you?
Read More...

Most Data Breaches Come From Within

By Ali Loney on September 24, 2012 News

26 second read time

Most Data Breaches Come From Within
Read More...

What Enterprise Architects and Time Travelers have in Common

By Tim OBrien on September 21, 2012 repository manager

5 minute read time

What Enterprise Architects and Time Travelers have in Common
Read More...

IBM: Top Threats Include Data Breaches, BYOD, Browser Exploits

By Ali Loney on September 20, 2012 News

1 minute read time

IBM: Top Threats Include Data Breaches, BYOD, Browser Exploits
Read More...

Don't Do it Wrong: Put that Puppet in a Box and Use Nexus for Devops

By Tim OBrien on September 20, 2012 Nexus Repo Reel

4 minute read time

Don't Do it Wrong: Put that Puppet in a Box and Use Nexus for Devops
Read More...

Stuxnet Tricks Copied By Computer Criminals

By Ali Loney on September 19, 2012 security

1 minute read time

Stuxnet Tricks Copied By Computer Criminals
Read More...

Bacon, Unicorns, JavaOne (Just a few of our favorite things)

By Emily Blades on September 19, 2012 Sonatype Says

24 second read time

Bacon, Unicorns, JavaOne (Just a few of our favorite things)
Read More...

Last Chance! Join Us In Philly For Breakfast & Some Hot Tech Talk

By Emily Blades on September 18, 2012 Nexus Repo Reel

1 minute read time

Last Chance! Join Us In Philly For Breakfast & Some Hot Tech Talk
Read More...

You're Using Maven 2 - Are You Sure?

By Manfred Moser on September 13, 2012 Nexus Repo Reel

2 minute read time

You're Using Maven 2 - Are You Sure?
Read More...

Data Breaches Expose 94 Million Records In The Government Sector

By Ali Loney on September 10, 2012 News

1 minute read time

Data Breaches Expose 94 Million Records In The Government Sector
Read More...

Nexus 2.1: Fueled by Gun-Toting Unicorns with Jet Packs

By Emily Blades on September 06, 2012 Nexus Repo Reel

15 second read time

Nexus 2.1: Fueled by Gun-Toting Unicorns with Jet Packs
Read More...

Nine 0Days: HP In The Security Dock Again

By Ali Loney on September 05, 2012 News

26 second read time

Nine 0Days: HP In The Security Dock Again
Read More...

Apple Patches Java 6 For OS X Snow Leopard, Lion

By Ali Loney on September 05, 2012 component vulnerabilities

1 minute read time

Apple Patches Java 6 For OS X Snow Leopard, Lion
Read More...

Hacker Group Claims Access To 12M Apple Device IDs

By Ali Loney on September 04, 2012 security

1 minute read time

Hacker Group Claims Access To 12M Apple Device IDs
Read More...

VMware Secures Server Products

By Ali Loney on September 04, 2012 security

19 second read time

VMware Secures Server Products
Read More...

Hacker Steals $250k In Bitcoins From Online Exchange Bitfloor

By Ali Loney on September 04, 2012 security

1 minute read time

Hacker Steals $250k In Bitcoins From Online Exchange Bitfloor
Read More...

Secret Account In Mission-Critical Router Opens Power Plants To Tampering

By Ali Loney on September 04, 2012 security

1 minute read time

Secret Account In Mission-Critical Router Opens Power Plants To Tampering
Read More...

Remember when Hackers Ignored Java? Those days are over... FBI Hacked via AtomicReferenceArray

By Tim OBrien on September 04, 2012 Sonatype Says

2 minute read time

Remember when Hackers Ignored Java? Those days are over... FBI Hacked via AtomicReferenceArray
Read More...

Hacker Hands Barto Manufacturer $190,000 Loss

By Ali Loney on September 03, 2012 security

1 minute read time

Hacker Hands Barto Manufacturer $190,000 Loss
Read More...

Rogue Microsoft Services Agreement Emails Lead To Latest Java Exploit

By Ali Loney on September 03, 2012 News

27 second read time

Rogue Microsoft Services Agreement Emails Lead To Latest Java Exploit
Read More...