Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Critical flaw found in Oracle developer tool

    A popular tool used by Oracle developers contains a critical flaw that could be used by an attacker to compromise a system. 

  • SANS: Attackers may be attempting Trend Micro exploits

    The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems. 

  • Trend Micro fixes flaws in ServerProtect, PC-cillin

    Attackers could tamper with servers and run malicious code by exploiting flaws in Trend Micro's ServerProtect, Anti-Spyware and PC-cillin products. But fixes are available. 

  • Java security: Is it getting worse?

    Some say that Java security is no longer up to snuff, suggesting that the development language is a magnet for harmful threats such as cross-site scripting and SQL injections. In this tip, security expert Joel Dubin examines the current factors affec... 

  • ActiveX flaws plague SAP GUI

    SAP recently plugged holes in its new SAP GUI to eliminate flaws that could allow an attacker to gain access to a system remotely. 

  • JavaScript hijacking

    JavaScript hijacking is a technique that an attacker can use to read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML)... (Continued) 

  • Microsoft investigates possible new Office flaw

    Attackers can exploit a new buffer-overflow flaw in Microsoft Office to cause a denial of service or run malicious code on targeted machines via IE, Symantec warned Wednesday. 

  • Serious flaws put Yahoo Messenger users in peril

    Attackers could exploit two serious flaws in Yahoo Messenger to run malicious code on targeted machines, vulnerability trackers warned Wednesday. 

  • Finding and blocking Web application server attack vectors

    Web application server attacks are nothing new, but attackers are coming up with creative new ways to penetrate them. Information security expert Peter Giannoulis examines how data-hungry attackers are using Web application servers to crack into back... 

  • buffer overflow

    A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold.