Email Alerts
-
Abobe fixes critical flaws
Adobe Reader 8 fixes flaws attackers could exploit to launch cross-site-scripting (XSS) attacks. The flaws relate to errors in how the program handles .pdf files. Article
-
Adobe Reader users urged to upgrade
The vendor said Adobe Reader 8 fixes serious flaws attackers could exploit for cross-site scripting and other attacks. It urged users to upgrade as soon as possible. Article
-
Implementing Multiple Solutions
Book Chapter
-
Adobe Reader flaws spook security experts
Security experts sound the alarm over Adobe Reader flaws that could be exploited for cross-site scripting attacks and other mayhem. Column
-
Apple QuickTime flaw could enable botnets
Attackers could exploit a new Apple QuickTime flaw to grow their botnets by tricking users into visiting malicious Web sites, and then hijacking their machines. Article
-
If a virtual machine is hacked, what are the consequences?
In our expert Q&A, information security threats expert Ed Skoudis explains how attackers can compromise a virtual machine. Ask the Expert
-
What new tactics can prevent cross-site scripting attacks?
Cross-site scripting attacks are a major threat to today's information security environment. In this expert Q&A, Ed Skoudis reveals how attackers use this technique to exploit vulnerable Web sites. Ask the Expert
-
MySpace, YouTube successes open door to Web 2.0 dangers
Web 2.0, and Ajax in particular, are introducing new threats to life on the Web. Many people are rushing to add interactive features to their Web applications using Ajax, but as columnist Mike Cobb explains, security has often been overlooked. Column
-
Software security flaws begin and end with Web application security
By now, developers are well aware that Web applications are vulnerable to an attack, though recent data indicates that the threat may be growing. In this tip, Michael Cobb offers insight as to why Web application vulnerabilities linger and provides d... Tip
-
Why Web services threats require application-level protection
Now that more organizations are using application-layer firewalls to secure Web applications, what's an attacker to do? Find a more vulnerable victim, of course. In this tip, SearchSecurity.com expert Michael Cobb explains how and why hackers have st... Tip
Security Management Strategies for the CIO