Email Alerts
-
Critical flaw found in Oracle developer tool
A popular tool used by Oracle developers contains a critical flaw that could be used by an attacker to compromise a system. Article
-
SANS: Attackers may be attempting Trend Micro exploits
The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems. Article
-
Trend Micro fixes flaws in ServerProtect, PC-cillin
Attackers could tamper with servers and run malicious code by exploiting flaws in Trend Micro's ServerProtect, Anti-Spyware and PC-cillin products. But fixes are available. Article
-
Java security: Is it getting worse?
Some say that Java security is no longer up to snuff, suggesting that the development language is a magnet for harmful threats such as cross-site scripting and SQL injections. In this tip, security expert Joel Dubin examines the current factors affec... Tip
-
ActiveX flaws plague SAP GUI
SAP recently plugged holes in its new SAP GUI to eliminate flaws that could allow an attacker to gain access to a system remotely. Article
-
JavaScript hijacking
JavaScript hijacking is a technique that an attacker can use to read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML)... (Continued) Definition
-
Microsoft investigates possible new Office flaw
Attackers can exploit a new buffer-overflow flaw in Microsoft Office to cause a denial of service or run malicious code on targeted machines via IE, Symantec warned Wednesday. Article
-
Serious flaws put Yahoo Messenger users in peril
Attackers could exploit two serious flaws in Yahoo Messenger to run malicious code on targeted machines, vulnerability trackers warned Wednesday. Article
-
Finding and blocking Web application server attack vectors
Web application server attacks are nothing new, but attackers are coming up with creative new ways to penetrate them. Information security expert Peter Giannoulis examines how data-hungry attackers are using Web application servers to crack into back... Tip
-
buffer overflow
A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Definition
Security Management Strategies for the CIO