Email Alerts
-
How to prevent clickjacking attacks with security policy, not technology
Clickjacking, an emerging hacker technique similar to cross-site scripting, tricks a user into executing malicious commands on a seemingly legitimate or innocent website. John Strand reviews how the attack works, how it compares to cross-site-scripti... Tip
-
Mozilla fixes cross-site-scripting flaws
The latest update also phases out support of Firefox 2. Article
-
Microsoft updates code analysis tool, SQL injection XSS library
The tools for developers help identify flaws to protect enterprise applications against SQL Injection and cross site scripting attacks. Article
-
Cisco: Cybercriminals more savvy than ever in 2008
The annual Cisco security report shows increases in hacker tactics, Web threats, Internet cybercrime, email spam and virtualization vulnerabilities. Article
-
Flash, PDF are growing malware targets
Security vendor Finjan reports a growing army of cybercriminals are buying cheap toolkits to exploit the Web. Article
-
Spam declines, Web-based attacks rise, says MessageLabs
Spam was down 3.4% in 2008, but attacks on social networks and flaws in websites are rising, according to an annual report from Symantec's MessageLabs. Article
-
Web app attacks grow, but developers may fight back
Web application security expert Ryan Barnett would like to see every company use a Web application firewall. But Barnett, director of security at Web application firewall vendor Breach Security Inc., knows that companies need to use more than just fi... Interview
-
What risks do application virtualization products pose?
Phrases that continue to be used to describe application virtualization are "isolation" or "bubble," but Michael Cobb examines the possible threats entering or escaping those 'isolated' environments. Ask the Expert
-
Quiz: Mitigating Web 2.0 threats
Take this five-question quiz to test your knowledge of social networking sites, software-as-a-service and common Web attacks and threats. Quiz
-
How to implement and enforce a social networking security policy
For a new generation of employees entering the workforce, social networking isn't a luxury, it's a necessity. Yet not all enterprises understand that failing to consider social networking security can lead to unfortunate consequences. David Sherry ex... Tip
Security Management Strategies for the CIO