Application Security
Home > 
Application Security
< back
Result: Item(s)
Guidelines for Using Software
A wide range of software can provide tools for ensuring information security.
Open Source Security
The availability of source code provides both attackers and defenders opportunities to study code in detail and identify software vulnerabilities.
Surfing the Web and e-Shopping
All kinds of things can now be done online, from shopping, banking to studying and research.
Downloading Software
The Internet provides a virtually boundless space for downloadable resources. There are a number of potential risks, however, that you should take care to avoid.
Playing Online Games Safely
Many computer and console video games can be played online against other players over the Internet. Players are allowed to communicate sometimes using text messages typed into the computer and sometimes using a microphone.
Security Tips for Using Mobile Applications
Mobile devices (such as smartphones and tablet) have become an indispensable part of our daily lives. Mobile applications would process massive information, including personal and sensitive information. Users should exercise care when using mobile applications and take precautions to protect themselves from the potential security threats such as information leakage.
Protecting against Malware
The best practices can protect your computer(s) more effectively against malware attacks
Using Software with Security Updates
All software products, including operating systems and software applications, have a lifecycle. Any software products could reach their end of support date and become outdated. End of support refers to the date when the software vendor no longer provides security updates, patches or customer support, etc. Any new vulnerability discovered in the software product after its end of support will not be addressed by new security updates.
Malicious code refers to computer viruses, worms, spyware, Trojan Horses and other undesirable software. Attack made by using such software is to cause disruption either by deleting files, sending emails, or rendering the host system inoperable.
Supply Chain Attack
Supply chain attacks are becoming increasingly popular since attackers can access systems of multiple organisations through trusted third-party vendors.