Email Alerts
-
The dangers of application logic attacks
Do you know how to prevent an application logic attack? In this tip, Web application security expert Michael Cobb explains how application logic attacks occur and offers tactics for protecting your Web applications. Tip
-
Attackers hit computers that manage Internet traffic
Several of the "root" servers that serve as the backbone of the Internet were targeted by digital miscreants Tuesday in the most significant attack in five years, though there was no major damage. Article
-
RSA Conference: Officials say DNS servers stood up well to attack
Government security officials at RSA Conference 2007 said the Internet's backbone appears to have stood tall against Tuesday's massive DNS server attack. Article
-
Web apps remain a trouble spot
Cross-site scripting and code injection have become even bigger development issues than buffer overflows. George Hulme reports the new threats to your Web applications. Article
-
Network-based attacks
The second tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by... Book Chapter
-
Balancing the cost and benefits of countermeasures
The final tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage published by ... Book Chapter
-
How to assess and mitigate information security threats
Learn how to assess and mitigate information security threats, like rootkits, worms and Trojans in the tip series created in collaboration with Realtimepublishers and Dan Sullivan, author of The Shortcut Guide to Protecting Business Internet Usage. Book Chapter
-
Attacks targeted to specific applications
This is the fourth tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage," pu... Book Chapter
-
What are application logic attacks?
In 2005, application logic flaws allowed alert, Web-savvy gamblers the chance to win a lot of money. In this SearchSecurity.com tip, application security expert Michael Cobb examines these types of vulnerabilities and how they can lead to application... Ask the Expert
-
Abobe fixes critical flaws
Adobe Reader 8 fixes flaws attackers could exploit to launch cross-site-scripting (XSS) attacks. The flaws relate to errors in how the program handles .pdf files. Article
Security Management Strategies for the CIO