Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Report: New hacking technique shields attackers

    A new report issued by UK-based security vendor Finjan shows that attackers are using IP addresses to mask a malicious Web page and avoid detection. 

  • Apple tackles a new QuickTime flaw

    For the second time in a month, Apple has been forced to fix a QuickTime flaw attackers could exploit to access sensitive system data and run malicious code. 

  • Symantec plugs dangerous flaw in Norton security software

    Attackers could exploit a flawed ActiveX control in Symantec Norton Internet Security and Norton Personal Firewall to run malware on targeted machines. 

  • Hackers get free reign to develop techniques says Microsoft security chief

    A patchwork of laws in the United States and foreign apathy toward cyber crimes give attackers an advantage over law enforcement, said Microsoft's top security chief Scott Charney. 

  • Hackers broaden reach of cross-site scripting attacks

    An explosion of AJAX-based applications has increased the damage that cross-site scripting (XSS) attacks can inflict on machines. A new tool uses XSS flaws to create a botnet. 

  • PING with Mark Odiorne

    In this exclusive interview Mark Odiorne, CISO at Scottish Re, provides insights on pen testing procedures, prioritizing security for senior management and keeping compliant. 

  • Google plugs dangerous flaw

    An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it. 

  • What causes buffer overflows and memory leaks in a Web application?

    Buffer overflows and memory leaks can cause serious harm to Web applications. In this SearchSecurity.com Q&A, application security expert Michael Cobb reveals how both can lead to security breaches and system compromises. 

  • Cross-site tracing vs. Cross-site scripting

    Cross-site tracing, slightly different from cross-site scripting, can still do some significant damage to your Web applications. In this SearchSecurity.com Q&A, information security threats expert Ed Skoudis reveals how each attack is carried out. 

  • Solaris 10 has zero-day Telnet flaw

    Attackers could exploit a zero-day flaw in Solaris 10's Telnet daemon to bypass authentication and gain unauthorized system access, security experts warn.