{"id":24469,"date":"2014-07-02T18:40:31","date_gmt":"2014-07-02T22:40:31","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24469"},"modified":"2014-07-02T18:40:31","modified_gmt":"2014-07-02T22:40:31","slug":"tools-catch-security-holes-in-open-source-code","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/open-source-software\/tools-catch-security-holes-in-open-source-code.php","title":{"rendered":"Tools catch security holes in open source code"},"content":{"rendered":"<p><p>    Maria Korolov | July 2, 2014  <\/p>\n<p>    Given its prevalence, open source code is virtually impossible    to avoid, but the proper steps need to be taken address its    vulnerabilities.  <\/p>\n<p>    This year has been the best of times and the worst of times for    open source code and security.  <\/p>\n<p>    On the one hand, the latest survey by Black Duck Software and    North Bridge Venture Partners shows that 72 percent of industry    professionals prefer open source software because it's more    secure than proprietary solutions.  <\/p>\n<p>    On the other hand, Heartbleed exposed a security flaw in the    widely-used, open source OpenSSL encryption tool that affected    more than half a million websites. Also this spring, TrueCrypt    unexpectedly shut down, citing \"unfixed security issues\" on its    SourceForge page, and a critical bug in Linux, GnuTLS, was    finally exposed after having been undiscovered for more than 10    years.  <\/p>\n<p>    Open source software is widely used in business in webservers    running Linux and Apache, in databases, in the Android    operating system, in code libraries used by enterprise    developers, and embedded into commercial software packages.  <\/p>\n<p>    Avoiding open source completely is not an option, but blindly    trusting the open source community to fix all mistakes is also    problematic.  <\/p>\n<p>    One solution is to use automated code-scanning tools to scan    code for known vulnerabilities and common programming errors.    Fortunately, the automated tools are getting better every year.  <\/p>\n<p>    Trust, but verify    Over the past few years, more than 5,000 security    vulnerabilities have been found in open source code, according    to the National Vulnerability    Database.  <\/p>\n<p>    Ideally, a company would check each of these vulnerabilities    against the open source software packages it uses, plus against    the open source software used inside commercial packages, and    even against pieces of code that their own programmers copied    off the Internet.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.computerworld.com.sg\/tech\/applications\/tools-catch-security-holes-in-open-source-code\" title=\"Tools catch security holes in open source code\">Tools catch security holes in open source code<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Maria Korolov | July 2, 2014 Given its prevalence, open source code is virtually impossible to avoid, but the proper steps need to be taken address its vulnerabilities. This year has been the best of times and the worst of times for open source code and security. On the one hand, the latest survey by Black Duck Software and North Bridge Venture Partners shows that 72 percent of industry professionals prefer open source software because it's more secure than proprietary solutions. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-24469","post","type-post","status-publish","format-standard","hentry","category-open-source-software"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24469"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24469"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24469\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}