Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • PING with Mark Odiorne

    In this exclusive interview Mark Odiorne, CISO at Scottish Re, provides insights on pen testing procedures, prioritizing security for senior management and keeping compliant. 

  • Google plugs dangerous flaw

    An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it. 

  • What causes buffer overflows and memory leaks in a Web application?

    Buffer overflows and memory leaks can cause serious harm to Web applications. In this SearchSecurity.com Q&A, application security expert Michael Cobb reveals how both can lead to security breaches and system compromises. 

  • Cross-site tracing vs. Cross-site scripting

    Cross-site tracing, slightly different from cross-site scripting, can still do some significant damage to your Web applications. In this SearchSecurity.com Q&A, information security threats expert Ed Skoudis reveals how each attack is carried out. 

  • Solaris 10 has zero-day Telnet flaw

    Attackers could exploit a zero-day flaw in Solaris 10's Telnet daemon to bypass authentication and gain unauthorized system access, security experts warn. 

  • The dangers of application logic attacks

    Do you know how to prevent an application logic attack? In this tip, Web application security expert Michael Cobb explains how application logic attacks occur and offers tactics for protecting your Web applications. 

  • RSA Conference: Officials say DNS servers stood up well to attack

    Government security officials at RSA Conference 2007 said the Internet's backbone appears to have stood tall against Tuesday's massive DNS server attack. 

  • Attackers hit computers that manage Internet traffic

    Several of the "root" servers that serve as the backbone of the Internet were targeted by digital miscreants Tuesday in the most significant attack in five years, though there was no major damage. 

  • Web apps remain a trouble spot

    Cross-site scripting and code injection have become even bigger development issues than buffer overflows. George Hulme reports the new threats to your Web applications. 

  • How to assess and mitigate information security threats

    Learn how to assess and mitigate information security threats, like rootkits, worms and Trojans in the tip series created in collaboration with Realtimepublishers and Dan Sullivan, author of The Shortcut Guide to Protecting Business Internet Usage.