Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • The dangers of application logic attacks

    Do you know how to prevent an application logic attack? In this tip, Web application security expert Michael Cobb explains how application logic attacks occur and offers tactics for protecting your Web applications. 

  • Attackers hit computers that manage Internet traffic

    Several of the "root" servers that serve as the backbone of the Internet were targeted by digital miscreants Tuesday in the most significant attack in five years, though there was no major damage. 

  • RSA Conference: Officials say DNS servers stood up well to attack

    Government security officials at RSA Conference 2007 said the Internet's backbone appears to have stood tall against Tuesday's massive DNS server attack. 

  • Web apps remain a trouble spot

    Cross-site scripting and code injection have become even bigger development issues than buffer overflows. George Hulme reports the new threats to your Web applications. 

  • Network-based attacks

    The second tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by... 

  • Balancing the cost and benefits of countermeasures

    The final tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage published by ... 

  • How to assess and mitigate information security threats

    Learn how to assess and mitigate information security threats, like rootkits, worms and Trojans in the tip series created in collaboration with Realtimepublishers and Dan Sullivan, author of The Shortcut Guide to Protecting Business Internet Usage. 

  • Attacks targeted to specific applications

    This is the fourth tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage," pu... 

  • What are application logic attacks?

    In 2005, application logic flaws allowed alert, Web-savvy gamblers the chance to win a lot of money. In this SearchSecurity.com tip, application security expert Michael Cobb examines these types of vulnerabilities and how they can lead to application... 

  • Abobe fixes critical flaws

    Adobe Reader 8 fixes flaws attackers could exploit to launch cross-site-scripting (XSS) attacks. The flaws relate to errors in how the program handles .pdf files.