Feeds

Over half of all apps have security holes

Dodgy development practices blamed

Beginner's guide to SSL certificates

More than half of all software applications failed to meet an acceptable level of security, according to a study based on real-world code audits by application security firm Veracode.

Around 57 per cent of applications failed to pass muster when first submitted to Veracode’s cloud-based testing service. A similar 56 per cent of finance-related applications failed first testing by Veracode’s security audit. The quality of the code used in many business-critical banking and insurance operations was simply not up to snuff.

Cross-site scripting was the most common vulnerability, accounting for 51 per cent of vulnerabilities uncovered during the testing process. Web applications developed in .NET were particularly susceptible to this class of flaw.

Cross-site scripting holes were to blame for the worms that spread on Twitter on Tuesday. In other environments they can be used in either phishing or drive-by download attacks.

Veracode said eight out of 10 web applications would fail a PCI audit, because they failed against one or other of the top 10 application security risks as defined by OWASP.

Third-party code makes up nearly 30 per cent of all applications submitted to Veracode for review, and third-party components make up a substantial proportion of internal developed applications. Applications developed by third parties had lower security quality than those developed in-house, failing to reach acceptable security standards 81 per cent of the time, according to Veracode.

One positive finding in the otherwise gloomy survey is that developers are repairing security vulnerabilities more quickly. Development teams using Veracode were able to fix problems in 16 days, on average, compared to the 30 days recorded in previous edition of the same study.

Matt Peachey, Veracode’s VP EMEA, said: "Developers continue to focus on functionality, quality, and speed of release. Security slows down The process and often gets overlooked.

"Many of the problems, such as cross-site scripting, are down to sloppy coding. This class of flaw is well known and documented as well as easy to fix but continue to very common."

Veracode's study is based on more than 2,900 applications that were put through their paces over the last 18 months through the Veracode SecurityReview cloud-based Platform. Billions of lines of scanned code from internally developed, commercial, open source and outsourced software running in large enterprises was parsed for problems using this process.

An analysis of this feature was published on Wednesday as part of Veracode's second annual State of Software Security Report. ®

Internet Security Threat Report 2014

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.