Application Attacks (Buffer Overflows, Cross-Site Scripting) News
May 26, 2015
A newly discovered router vulnerability could leave millions of connected devices open to denial-of-service attacks and remote code execution.
April 17, 2015
New Web security models use browser behavior and polymorphism to protect against data theft and fraud.
March 25, 2015
The Ponemon Institute says enterprises are devoting millions of dollars to mobile application development, but barely any of the money is focused on security.
July 01, 2014
A new online archive is allowing researchers to anonymously submit and expose cross-site scripting vulnerabilities uncovered across the Web.
Application Attacks (Buffer Overflows, Cross-Site Scripting) Get Started
Bring yourself up to speed with our introductory content
Security luminary and White Ops co-founder Dan Kaminsky reveals the one common tool employed by remote attackers that is leading to a new way to detect malware. Continue Reading
On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. Continue Reading
This security school lesson details the myriad of Web application attacks in circulation today, providing detailed explanations of SQL injection attacks, clickjacking, cross-site scripting and cross-site request forgery attacks and other Web-based ... Continue Reading
Evaluate Application Attacks (Buffer Overflows, Cross-Site Scripting) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Network-attached storage devices can present a plethora of security issues to an enterprise. Expert Kevin Beaver explains how to detect and mitigate the risks. Continue Reading
App attacks are multiplying. But before you buy a Web application firewall, learn about WAF technology and how it protects your apps. Continue Reading
Microsoft Silverlight has been in the spotlight due to an increase in the number of exploit kits it is included in. Expert Nick Lewis explains the threat's severity and how to mitigate it. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
v2 Review: Premature product - not a proper product to be used for PCI approved web scanning Having done numerous penetration tests using various...Continue Reading
Although the user experience could be improved, it's the best dynamic code analysis tool one can invest in.Powered by IT Central Station
Valuable Features: It identifies the vulnerabilities in SSL. • Improvements to My Organization: We were able to unravel bugs in earlier...Continue Reading
Centerbeam's security options for good data security 1. closed API's 2.Integration tied to customer environment and ActiPowered by IT Central Station
Valuable Features: The access of your whole group of data and the functionality of the command line, it is direct and very easy to use, in...Continue Reading
Manage Application Attacks (Buffer Overflows, Cross-Site Scripting)
Learn to apply best practices and optimize your operations.
Enterprise threats expert Nick Lewis reveals two key ways to prevent SQL injection attacks without breaking the bank on an expensive code review. Continue Reading
Enterprise threats expert Nick Lewis examines how the BREACH attack exploits HTTPS traffic and what enterprises can do to mitigate the attack risk. Continue Reading
In this issue, find out who won this year’s Security 7 Award, Also, we examine the pros and cons of the Metasploit penetration testing framework. Continue Reading
Problem Solve Application Attacks (Buffer Overflows, Cross-Site Scripting) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
SQL injection attacks continue to plague enterprises. However, performing audit code validation when using outsourced developers can be a challenge. Expert Nick Lewis explains how to prevent these attacks. Continue Reading
A vulnerability found in Web browsers allows malware to bypass XSS filters. Michael Cobb explains how to address the issue. Continue Reading
Learn how DOM-based XSS attacks differ from typical cross-site scripting attacks, and learn best practices for defending against them. Continue Reading