New Report: SQL Injection vulns are hidden in web services (learn how to find them)

Is your scanner like the emperor's new clothes?

In this new report, The Widening Web Application Security Scanner Coverage Gap in RIA, Mobile and Web Services: Is Your Scanner like the Emperor’s New Clothes?, Dan Kuykendall and Matthew Cohen of NT OBJECTives cover the nine new technologies most overlooked by automated scanners. These technologies are hiding common vulnerabilities like SQL Injection. This report details each technology: what they are, why it is hard for automated scanners to find vulnerabilities in them and what you can do about it.

Read this report to learn how to secure these technologies:

  • AJAX
  • AMF – Flash remoting
  • Google Web Toolkit (GWT)
  • JSON
  • REST
  • XSRF/CSRF Tokens
  • Web services that power mobile applications

Download this research paper now to get all the facts and start finding & remediating vulnerabilities in these technologies!
www.ntobjectives.com/go/widening-web-application-security-scanner-coverage-gap-in-ria-mobile-and-web-services/

About Kim Dinerman
Kim is currently the VP of Marketing at NT OBJECTives. She has been focused on application security since early 2005 where served as Director of Product Marketing at SPI Dynamics and as Global Campaigns Manager at Hewlett Packard. Prior to 2005, she was Director of Product Management at EzGov and she began her career at Accenture where she spent eight years IT consulting. Connect with Kim on Google+

Leave a comment

Your email address will not be published.

*