Email Alerts
-
Big security fixes for QuickTime, Flash Player
Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines. Article
-
How to prevent input validation attacks
Learn what canonicalization is and what Web developers can do to prevent input validation attacks. Ask the Expert
-
Attacking Web authorization: Web authorization-Session token security
This excerpt from Chapter 5: Attacking Web Authorization of "Hacking Exposed Web Applications, Second Edition," by Joel Scambray, Mike Schema and Caleb Sima provides authorization and session management technique best practices Book Chapter
-
Unpatched Windows flaws affect Help Viewer
Updated: Proof-of-concept exploits demonstrate how attackers could crash vulnerable machines or launch malicious code. But the flaws aren't nearly as serious as recently exploited Microsoft glitches. Article
-
Security Blog Log: Israeli-Hezbollah war spills into cyberspace
This week blogosphere warily watches online attacks inspired by the Mideast conflict and rants over the latest security incidents at AOL and the VA. Article
-
McAfee products vulnerable to code execution flaw
VirusScan, Personal Firewall Plus, SpamKiller and other McAfee products are reportedly vulnerable to an unspecified remote code execution flaw. Article
-
Netscape.com hit with cross-site scripting attack
Update: The popular Web portal was victimized by a cross-site scripting attack early Wednesday, but Netscape says the problem has been addressed and its users are now safe. Article
-
Security Bytes: New Microsoft exploits in the wild
The exploits target issues Microsoft patched earlier this month. Meanwhile, flaws are reported in Oracle for OpenView and a Mozilla Firefox keystroke logger is on the loose. Article
-
CRLF injection attacks: How they work and what to do about them
CRLF injection attacks may not be as popular as other application attacks, but they can be just as devastating. Learn how CRLF injection attacks are executed and how to defend your organization against these attacks. Tip
-
Application layer logging quiz answers
Application layer logging quiz answers Quiz
Security Management Strategies for the CIO