Google unveils Skipfish security tool

Powered by SC Magazine
 

Free software scans web apps for flaws.

Google has released a new development tool aimed at uncovering security holes in web applications.

The company said that the new tool, dubbed Skipfish, will allow developers to scan web applications for possible security vulnerabilities.

Currently in beta mode, the tool is designed to support multiple application frameworks and will run on Windows, Linux, MacOSX and BSD operating systems.

Google said that speed and compatibility were the main priorities when designing the tool. Skipfish was written in C and engineered to run quickly while putting minimal strain on processors.

"The safety of the Internet is of paramount importance to Google, and helping web developers build secure, reliable web applications is an important part of the equation," wrote Google developer Michal Zalewsk in a blog posting.

"We feel that Skipfish will be a valuable contribution to the information security community, making security assessments significantly more accessible and easier to execute."

Protecting web applications and cloud computing services has arguably become the biggest issue in the security world as of late. Analysts and developers alike have noted a distinct lack of trust from users in many web applications, particularly enterprise IT services.

As a result, security vendors have stepped up efforts to offer tools and services to web application and cloud computing developers.

Copyright ©v3.co.uk


Google unveils Skipfish security tool
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  25%
TOTAL VOTES: 346

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 144

Vote