Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Balancing the cost and benefits of countermeasures

    The final tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage published by ... 

  • Network-based attacks

    The second tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book The Shortcut Guide to Protecting Business Internet Usage published by... 

  • Attacks targeted to specific applications

    This is the fourth tip in our series, "How to assess and mitigate information security threats," excerpted from Chapter 3: The Life Cycle of Internet Access Protection Systems of the book "The Shortcut Guide to Protecting Business Internet Usage," pu... 

  • What are application logic attacks?

    In 2005, application logic flaws allowed alert, Web-savvy gamblers the chance to win a lot of money. In this SearchSecurity.com tip, application security expert Michael Cobb examines these types of vulnerabilities and how they can lead to application... 

  • Critical Apple flaw discovered in Mac OS X

    Attackers can exploit the flaw remotely to compromise a user's system via the Safari Web browser. 

  • Abobe fixes critical flaws

    Adobe Reader 8 fixes flaws attackers could exploit to launch cross-site-scripting (XSS) attacks. The flaws relate to errors in how the program handles .pdf files. 

  • Adobe Reader users urged to upgrade

    The vendor said Adobe Reader 8 fixes serious flaws attackers could exploit for cross-site scripting and other attacks. It urged users to upgrade as soon as possible. 

  • Implementing Multiple Solutions

     

  • Adobe Reader flaws spook security experts

    Security experts sound the alarm over Adobe Reader flaws that could be exploited for cross-site scripting attacks and other mayhem. 

  • Apple QuickTime flaw could enable botnets

    Attackers could exploit a new Apple QuickTime flaw to grow their botnets by tricking users into visiting malicious Web sites, and then hijacking their machines.