Software Integrity

Search Results for 'blockchain'

 

Tineola: Taking a bite out of enterprise blockchain

Parsia Hakimian and Stark Riedesel presented Tineola at DEF CON 26 Enterprise blockchain platforms are one of the big questions faced by many corporations, including some of our customers. And when our customers come to us with complex problems, we take their unique situations into consideration and come up with tailored solutions. So when our […]

Continue Reading...

Posted in Developer Enablement, Red Teaming | Comments Off on Tineola: Taking a bite out of enterprise blockchain

 

Employees post passwords online, Hacking tool grants access to DVRs, and Blockchain

Taylor Armerding, Synopsys Software Integrity Group senior strategist, gives you the scoop on application security and insecurity in this week’s Weekly Security Mashup episode. When employees post passwords online via Brian Krebs, security blogger – Krebsonsecurity.com – Hosts of companies using the online collaboration tool Trello.com share passwords for sensitive internal resources. New hacking tool lets […]

Continue Reading...

Posted in Data Breach, Weekly Security Mashup | Comments Off on Employees post passwords online, Hacking tool grants access to DVRs, and Blockchain

 

IMF wants to pierce the blockchain anonymity veil

Anonymity—one of the biggest draws of cryptocurrency and the blockchain infrastructure it depends on—could get turned on its head if the vision of the head of the International Monetary Fund (IMF) comes true. Christine Lagarde, managing director of the IMF, called in a recent blog post for more regulation of the cryptocurrency market—to include the […]

Continue Reading...

Posted in Financial Services Security | Comments Off on IMF wants to pierce the blockchain anonymity veil

 

How can blockchain applications adapt and adopt software security best practices?

Though blockchain-native software is in its infancy, the technology races forward to meet more and more use cases. But the community doesn’t seem to have taken software security principles seriously, as we can see from the recent scan of Ethereum smart contracts that identified 34,200 vulnerable contracts. For added perspective, a smart contract is a […]

Continue Reading...

Posted in General | Comments Off on How can blockchain applications adapt and adopt software security best practices?

 

Blockchain security and the cryptocurrency boom, Part 2: Application

In Part 1 of our article on blockchain security and cryptocurrency, we took a hard look at the core components that make up a successful cryptocurrency like Bitcoin. From the distributed network itself to the individuals who wish to own and use a cryptocurrency wallet to transfer or spend Bitcoin, security is key (pun intended) […]

Continue Reading...

Posted in Financial Services Security | Comments Off on Blockchain security and the cryptocurrency boom, Part 2: Application

 

Blockchain security and the cryptocurrency boom, Part 1: Theory

Thanks to Bitcoin, it’s fair to say that “blockchain” is a buzzword at the moment—like DevOps, or Zumba. This article isn’t going to dive into what a blockchain is, because many others out there already do that. Here’s a pretty good one that has a snappy description of the evolution of Bitcoin and its symbiotic […]

Continue Reading...

Posted in Financial Services Security | Comments Off on Blockchain security and the cryptocurrency boom, Part 1: Theory

 

Can blockchain and the BTC license fund health insurance?

  The BTC license hit my radar screen recently. Billed as “sexy” by the author, the permissive BTC license employs Blockchain and may signal a new trend going forward that could transform the way many developers work… and how they get their health insurance. Background I chair the Linux Foundation’s SPDX work group. Among other things, SPDX supports a […]

Continue Reading...

Posted in Healthcare Security, Open Source Security | Comments Off on Can blockchain and the BTC license fund health insurance?

 

Former Google engineer launches blockchain-enabled OS for financial services

A former Google engineer has created an operating system for the financial service industry that uses blockchain, a component developed by Bitcoin. Known as Vault OS, the operating system creates a shared database in which participants can trace every transaction ever made. The ledger used is both tamperproof and transparent. That means transactions can be […]

Continue Reading...

Posted in Financial Services Security | Comments Off on Former Google engineer launches blockchain-enabled OS for financial services

 

Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

This is the first of two articles that describe how to use the Defensics SDK to fuzz Bitcoin software. Specifically, you will learn how to model one of the Bitcoin protocol messages and use the Defensics SDK to perform fuzzing on the bitcoind process. This is an advanced technical tutorial, and you will need some background […]

Continue Reading...

Posted in Developer Enablement, Fuzz Testing | Comments Off on Fuzzing Bitcoin with the Defensics SDK, part 1: Create your network

 

Hacking Security Episode 1: What is Hacking Security?

Hacking Security is a monthly podcast on emerging trends in application security development hosted by Steve Giguere, lead EMEA engineer at Synopsys. What is Hacking Security? Episode 1 covers how we came up with the name “Hacking Security.” Why did we decide on this name? Take five minutes to learn more, or read the transcript […]

Continue Reading...

Posted in Hacking Security, Podcasts | Comments Off on Hacking Security Episode 1: What is Hacking Security?