Top 25 programming errors revealed

Experts and security vendors around the world finally have a measuring stick to help decide whether software is vulnerable to attack.

Security experts in Europe and the US have joined forces to create a list of the top 25 most dangerous programming errors.

The result of a collaboration between the SANS Institute, MITRE, and experts in software security, the list presents detailed descriptions of the top 25 programming errors, as well as guidance in avoiding and dealing with them.

Advertisement - Article continues below

The aim of the top 25 list is to prevent vulnerabilities at source, by educating programmers about common mistakes which are made before software has been shipped. Such flaws were dangerous because they frequently allow attackers to take over software and prevent it from working, or let them steal data.

Software managers and CIOs were advised to use the top 25 list as a "measuring stick" which could help them secure their software.

Chief technology officer for Core Security, Ivan Arce, said that the top 25 list was the first serious attempt at building a classification of software security weaknesses and flaws.

"It is a necessary and long overdue step towards creating a common language for the software development and security communities," he said in a statement.

"They are in need of a more rational way to address which are currently the most urgent and relevant software security problems."

Advertisement
Advertisement - Article continues below

A whole range of vendors - including Microsoft, Symantec, EMC, McAfee and Verisign - gave their support to the project.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/security/privacy/355155/zoom-kills-facebook-integration-after-data-transfer-backlash
privacy

Zoom kills Facebook integration after data transfer backlash

30 Mar 2020
Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/cloud/355098/ibm-dedicates-supercomputing-power-to-coronavirus-researchers
high-performance computing (HPC)

IBM dedicates supercomputing power to coronavirus research

24 Mar 2020