Application Attacks (Buffer Overflows, Cross-Site Scripting) News
November 10, 2015
Bluebox Security unveiled a troubling study on mobile application threats and also introduced a new product to protect consumer apps on employee-owned devices.
August 06, 2015
At Agile2015, discussion turned to how a user story can offer a different approach to Agile security.
May 26, 2015
A newly discovered router vulnerability could leave millions of connected devices open to denial-of-service attacks and remote code execution.
April 17, 2015
New Web security models use browser behavior and polymorphism to protect against data theft and fraud.
Application Attacks (Buffer Overflows, Cross-Site Scripting) Get Started
Bring yourself up to speed with our introductory content
Security luminary and White Ops co-founder Dan Kaminsky reveals the one common tool employed by remote attackers that is leading to a new way to detect malware. Continue Reading
On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. Continue Reading
Application blacklisting, sometimes just referred to as blacklisting, is a network administration practice used to prevent the execution of undesirable programs. Such programs include not only those known to contain security threats or ... Continue Reading
Evaluate Application Attacks (Buffer Overflows, Cross-Site Scripting) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Network-attached storage devices can present a plethora of security issues to an enterprise. Expert Kevin Beaver explains how to detect and mitigate the risks. Continue Reading
App attacks are multiplying. But before you buy a Web application firewall, learn about WAF technology and how it protects your apps. Continue Reading
Microsoft Silverlight has been in the spotlight due to an increase in the number of exploit kits it is included in. Expert Nick Lewis explains the threat's severity and how to mitigate it. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
v2 Review: Premature product - not a proper product to be used for PCI approved web scanning Having done numerous penetration tests using various...Continue Reading
It enables Technical Leads to monitor and measure the effectiveness of delivery teams, but it needs better integration with JIRA.Powered by IT Central Station
Valuable Features: Moving to a largely evidence-based assessment is hugely beneficial, especially if you are managing out-sourced resources. It...Continue Reading
It's enabled us to improve software quality and help us to disseminate best practices, but it needs better design of the interface.Powered by IT Central Station
Valuable Features: This product is open source and very convenient. • Improvements to My Organization: It's enabled us to improve software...Continue Reading
Manage Application Attacks (Buffer Overflows, Cross-Site Scripting)
Learn to apply best practices and optimize your operations.
Enterprise threats expert Nick Lewis reveals two key ways to prevent SQL injection attacks without breaking the bank on an expensive code review. Continue Reading
Enterprise threats expert Nick Lewis examines how the BREACH attack exploits HTTPS traffic and what enterprises can do to mitigate the attack risk. Continue Reading
In this issue, find out who won this year’s Security 7 Award, Also, we examine the pros and cons of the Metasploit penetration testing framework. Continue Reading
Problem Solve Application Attacks (Buffer Overflows, Cross-Site Scripting) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Michael Cobb explains the difference between cross-site scripting and cross-site scripting inclusion (XSSI) flaws. Continue Reading
Researchers warned about the rise of a new cross-site scripting flaw involving same-origin policy. Expert Nick Lewis explains the vulnerability and how to prevent falling victim. Continue Reading
Exploit kits and malware attacks have adopted a technique called domain shadowing to stay ahead of the game. Learn what domain shadowing is and how to defend against attacks using it. Continue Reading