Access "Web browser security features make attacks harder"
This article is part of the April 2012 issue of An expert guide to tokenization and using it effectively
Security capabilities built into popular browsers are making it more difficult than ever for cybercriminals to carry out attacks using browser vulnerabilities, according to security experts. While the security improvements don’t make browsers bulletproof, recent hacking contests demonstrate the overall enhanced state of browser security. Microsoft, Mozilla and Google have all been developing support for substantial security capabilities in recent years that isolate critical components and help prevent attackers from using the browser as a stepping stone to a more substantial attack, says Chris Valasek, senior research scientist at Accuvant Labs. “It’s accepted that users will click on links and browsers will be exploited, but if you have something to contain the attack you are going to be much better off,” Valasek says. “As long as there are smart attackers out there with time on their hands they’re going to take vulnerabilities and create something to exploit them, but we’re seeing that it’s taking more time and more effort.” At RSA Conference 2012, Valasek... Access >>>
Premium Content for Free.
Unified threat management devices for the enterprise
by Joel Snyder, Contributor
UTMs aren’t just for SMBs anymore. Here are four requirements for enterprise-grade UTM.
AMI networks: PKI security considerations
by Seth Bromberger, Contributor
PKI components in smart grid and AMI infrastructure introduce new hazards.
- Unified threat management devices for the enterprise by Joel Snyder, Contributor
Understanding tokenization: What is tokenization and when to use it
by Adrian Lane, Contributor
Tokenization protects sensitive data to reduce the compliance burden.
Web browser security features make attacks harder
by Robert Westervelt, News Director
Accuvant analysis and hacking contests illustrate browser security improvements.
- Understanding tokenization: What is tokenization and when to use it by Adrian Lane, Contributor
Don’t turn security Big Data analysis into a forgettable cliché
by Michael S. Mimoso, Editorial Director
It’s easy to be cynical about the latest security buzzword, but don’t be so quick to dismiss it.
Marcus Ranum chat: Security startups and security innovation
by Marcus J. Ranum, Contributor
Security expert Marcus Ranum talks with Peter Kuper, a partner with In-Q-Tel focused on funding compelling startups to accelerate innovation for the intelligence community.
Information security roles and technology shifts
by Paul Rohmeyer, Contributor
New technologies and business models are rapidly changing the role of the security pro.
- Don’t turn security Big Data analysis into a forgettable cliché by Michael S. Mimoso, Editorial Director
More Premium Content Accessible For Free
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...