Email Alerts
-
Kaspersky website hacked, customer activation codes exposed
Customer email addresses and up to 25,000 activation codes were exposed on a server for 10 days, the antivirus vendor said. Article
-
SQL injection attacks targeting Flash, JavaScript errors
Coding errors leave thousands of websites vulnerable, but attackers are starting to target Flash and JavaScript errors for exploitation, experts say. Article
-
How to secure a website containing badware (banner82)
In an expert Q&A, John Strand reviews how SQL injection attacks can lead to banner82 attacks and a "badware" label for your website. Ask the Expert
-
Phishing scams for money? Don't bet on it
Two security researchers say that most phishers fail to earn big money for their work. Article
-
Future security threats: Enterprise attacks of 2009
Will organizations be ready for next year's enterprise security threats? Expert John Strand reviews what's in store for 2009, including new weapons, old vulnerabilities, and new takes on old attack techniques. Tip
-
How to prevent cross-site scripting (XSS) session hijacking
Cross-site scripting and SQL injections still providing hackers with plenty of opportunities to successfully access data or take control of a compromised machine. MIchael Cobb explains how you can improve your application defenses. Ask the Expert
-
To prevent cross-site scripting, should specific words and characters be rejected?
In this expert Q&A, John Strand explains which application development best practices can stop cross-site scripting attacks. Ask the Expert
-
What can encoded syntax attacks do to Web applications?
In this Q&A, expert Michael Cobb explains how to test Web servers so that they are not vulnerable to encoded syntax attacks Ask the Expert
-
Microsoft Windows XML flaw exploits test desktop antimalware
An NSS Labs test of six business products yield disappointing results. Article
-
Defending against Internet security threats and attacks
From buffer overflows to cross-site scripting, Web threats are many. Security researchers at Information Security Decisions 2008 discuss how to keep enterprises safe from these attacks (part 2 of 4). Video
Security Management Strategies for the CIO