-
July 2004: The best of SearchSecurity.com
Peruse our top 10 tips and news articles for the month of July, as judged by readers like you.30 Jul 2004
-
Microsoft fixes Internet Explorer flaws
The fix addresses Internet Explorer security holes exploited by Download.ject and other malicious code.30 Jul 2004
-
Improving software security, one dollar a line
Software quality is a critical security issue that can no longer be ignored, but it can't be fixed easily either said security experts at the Burton Group Catalyst Conference.29 Jul 2004
-
Beyond borders: Losing the perimeter to gain better data security
A new concept introduced at Black Hat Briefings cuts costs and time to market while providing better network protections where needed.29 Jul 2004
-
Security Bytes
Gentoo, Mandrake and Opera flaws; Mydoom-M winds down, but Zindos-A uses it to spread.29 Jul 2004
-
Is your site vulnerable to SQL injection attacks?
SQL injection exploits may soon be as common as those targeting Windows and Unix flaws, experts say. An estimated 60% of Web applications that use dynamic content are likely vulnerable, with devast...29 Jul 2004
-
Automated SQL injection: What your enterprise needs to know, part 2
The second of a two-part interview with SPI Dynamics CTO Caleb Sima tells what you should fear, why and what you can do to mitigate your risk.29 Jul 2004
-
Microsoft to release out-of-cycle patch
The fix will address Internet Explorer security holes exploited during last month's Download.ject attack.29 Jul 2004
-
Security issues of using shared code
Security pros need to be aware of code that is being "borrowed" for custom applications.28 Jul 2004
-
New attacks and vulnerability trends highlighted at Black Hat
Presentations beginning today will analyze vulnerabilities, zero-day code, phishing and secure wireless deployment, among many other topics.28 Jul 2004
-
Industry Notebook: Watchfire buys Sanctum
Watchfire expands its portfolio with its Sanctum purchase. Also in this week's news, Thor Technologies updates XIM 8.0, and NFR Security unveils Sentivist IPS.28 Jul 2004
-
Expert advice: Does two-factor authentication protect you from hackers?
Expert Jonathan Callas explains the weaknesses and strengths of two-factor authentication.27 Jul 2004
-
Users defy security protocols
One in four IT practitioners said users aren't following security procedures, according to an Evans Data Corp. survey.27 Jul 2004
-
Security Bytes: Mozilla flaw allows SSL cert abuse, while Trojan poses as Terminator
Firefox vulnerability rated "moderately critical" while NIST discourages DES and Nokia decides to address "bluesnarfing."27 Jul 2004
-
Standardizing information classification
Learn more about standardizing information classification.27 Jul 2004
-
Honeynet security consoles and honeypot legal issues
Find out more about the honeypot legal issues in this excerpt from "Know your enemy: Learning about security threats."26 Jul 2004
-
Know Your Enemy -- Learning about Security Threats: Chapter 16, Profiling
Learn more about the profile of an attacker.26 Jul 2004
-
Automated SQL injection: What your enterprise needs to know
SQL injection exploits may soon be as common as those targeting Windows and Unix flaws, experts say. An estimated 60% of Web applications using dynamic content are likely vulnerable, with devastati...26 Jul 2004
-
Learning about Security Threats: Profiling
A look at what it means to be a hacker.26 Jul 2004
-
Wireless devices a DNC hazard
Thousands of wireless devices around the FleetCenter could cause problems for the Democratic National Convention.26 Jul 2004
Security Management Strategies for the CIO