Email Alerts
-
New blacklists: Highly predictive or hardly worth it?
Renowned security expert Marcus Ranum once declared that blacklists were one of the most misguided ideas in computer security. But what about a new, more customized approach called highly predictive blacklists? John Strand takes a look at the emergin... Tip
-
Googling Security: How Much Does Google Know About You?
In an excerpt from Googling Security: How Much Does Google Know About You?, author Greg Conti explains how attackers exploit advertising networks to compromise end-user machines. Book Chapter
-
Microsoft sees OS flaws drop, application breaches rise
In its semiannual Security Intelligence Report, Microsoft says it has seen a significant drop in vulnerabilities discovered in the operating system. Article
-
Adobe issues patch for critical PageMaker flaws
Flaws in Adobe PageMaker could allow a hacker to take control of an affected system. Article
-
Adobe addresses clickjacking in latest Flash Player
Adobe issued Flash Player 10, blocking ongoing clickjacking attacks and also preventing attackers from manipulating a user's clipboard. Article
-
What are the basics of a Web browser exploit?
John Strand explains how attackers target a flaw in either the browser or in an application that the browser calls to process a Web request. Ask the Expert
-
What is the best way to manually test for buffer overflows?
There are two ways of reviewing a program for buffer overflows. Michael Cobb explains how to examine a program's source code and file code. Ask the Expert
-
Clickjacking details released after attack proof-of-concept emerges
Security researchers released details of the clickjacking attacks, warning of the seriousness of the problem because they have discovered multiple variants on the Web. Article
-
IronPort feature detects exploited websites
IronPort's cloud scanning feature classifies sites based on the risk they pose. Article
-
SaaS startups enter Web security gateway market
Web security vendors Zscaler Inc., Purewire Inc. enter growing Software as a Service (SaaS) space dominated by appliance vendors Article
Security Management Strategies for the CIO