Email Alerts
-
Shrewd attackers bypass old security defenses with Web attacks
Cybercriminals are conducting Web-based attacks to bypass traditional protection technologies. With most security vendors unable to solve the problem, companies need to rethink their security strategy. Column
-
How should application developers manage cookies?
Cookies hold data, such as user preferences and session tracking credentials. In this expert Q&A, Ed Skoudis explains how application developers can define and manage the cookies appropriately. Ask the Expert
-
What software development practices prevent input validation attacks?
Improper input validation leads to numerous kinds of attacks, including cross-site scripting, SQL injection and command injection. In this expert Q&A, Michael Cobb reviews the most important application development practices. Ask the Expert
-
Spam continues surge as spammers become clever in '07
Despite arrests of high profile spammers in 2007, spam continues to plague company servers. Article
-
What is the relationship between shellcode and exploit code?
Is shellcode always considered exploit code? In this expert response, Michael Cobb breaks down the two malware terms. Ask the Expert
-
Critical security patch for Adobe Flash Player
Adobe Systems Inc. has patched multiple Adobe Flash Player flaws attackers could exploit to hijack computers and cause a variety of damage. Article
-
Apple updates QuickTime to plug serious flaw
Apple worked quickly to address the zero-day buffer-overflow flaw in its widely used QuickTime media player, becuase exploit code surfaced late last month. Article
-
Microsoft warns of Windows zero-day
Attackers could exploit a zero-day flaw in Windows' Web Proxy Auto-Discovery (WPAD) feature to access sensitive data, Microsoft warned Monday. Article
-
IBM Lotus Notes critical flaw affects file viewing
Attackers can exploit the flaw remotely to crash the application or gain access to a victim's machine. Article
-
Making the case for Web application vulnerability scanners
If a Web application scanner can find common SQL injection flaws, cross-site scripting vulnerabilities, buffer overflows and dangerous backdoors, then why aren't more enterprises using them? In this tip, Michael Cobb not only examines where the tools... Tip
Security Management Strategies for the CIO