Tag Archives: securing mobile applications

Is your scanner like the emperor's new clothes?

New Report: SQL Injection vulns are hidden in web services (learn how to find them)

In this new report, The Widening Web Application Security Scanner Coverage Gap in RIA, Mobile and Web Services: Is Your Scanner like the Emperor’s New Clothes?, Dan Kuykendall and Matthew Cohen of NT OBJECTives cover the nine new technologies most overlooked by automated scanners. These technologies are hiding common vulnerabilities like SQL Injection. This report details each technology: what they are, why it is hard for automated scanners to find vulnerabilities in them and what you can do about it.

Read this report to learn how to secure these technologies:

  • AJAX
  • AMF – Flash remoting
  • Google Web Toolkit (GWT)
  • JSON
  • REST
  • XSRF/CSRF Tokens
  • Web services that power mobile applications

Download this research paper now to get all the facts and start finding & remediating vulnerabilities in these technologies!