bug

Google’s Project Zero Recruits Bug Hunters to Protect the Internet

Calling Internet security a “top priority,” Google announced Project Zero, its new security research team dedicated solely to ferreting out potential targeted attacks—such as the Heartbleed bug—that can affect a significant number of people.

Pamela Rentz's picture
Pamela Rentz
Expecting One Giant? Bring Five Stones

Similar to the story of David and Goliath, software developers and testers hunt giants too—bugs, that is. Like David, they should believe that where there is one giant, there are probably five nearby, and they should hope to find each one.

Bonnie Bailey's picture
Bonnie Bailey
Expect Glitches to Hit New Healthcare Insurance Marketplaces

On October 1, the new US government-backed healthcare insurance marketplaces begin open enrollment for individuals. However, recent reports suggest that the software behind the marketplaces may not be quite ready for opening day, and could cause glitches.

Jonathan Vanian's picture
Jonathan Vanian
Security Researcher Proves Facebook Bug by Hacking Zuckerberg’s Wall

Security researcher Khalil Shreateh discovered a Facebook bug that allowed a hacker to post on anyone’s wall—even one with privacy settings. But Shreateh’s reporting method raised some eyebrows: Shreateh exploited the bug to post on Facebook founder and CEO Mark Zuckerberg’s wall.

Beth Romanik's picture
Beth Romanik
Software Testers—Are You Effective Bug Advocates?

Bug advocacy goes beyond bug reports and has more to do with what happens outside the realm of a defect tracking system. Anuj Magazine looks at the skills needed to be an effective bug advocate: ability to convey bad news, influential work relationships, and a positive influence on stakeholders.

Anuj Magazine's picture
Anuj Magazine
Ask Questions and Observe Language to Find State Transitions

Bugs that peek out during a window of vulnerability can make us think we’ve been outsmarted. But in their sleuthing bag testers have a powerful tool that can surface such issues: state modeling. Bonnie Bailey describes how to ask the right questions and observe language to find state transitions.

Bonnie Bailey's picture
Bonnie Bailey
Early May Software Roundup

In this roundup of interesting software tidbits, we learn that you might not want to take advantage of software bugs you find when playing video poker. Also, autocratic governments are using spy software to track activists and suspected dissidents.

Jonathan Vanian's picture
Jonathan Vanian
January Software Roundup

In this software roundup, we learn that Maryland and Pennsylvania are using software to prevent murders, new software shown at the Consumer Electronics Show underwhelmed some prominent tech pundits, and the Department of Homeland Security recommended disabling Java for a security exploit.

Jonathan Vanian's picture
Jonathan Vanian