Email Alerts
-
How to prevent cross-site scripting
Learn how cross-site scripting, a common Web application attack, operates and what Web users and Web developers can do to protect against it, in this information security threats Ask the Expert Q&A. Ask the Expert
-
Answers: Could you detect an application attack?
SearchSecurity Retention
-
Application logging is critical in detecting hack attacks
Now that networks are fairly well-protected, attackers are targeting application servers. In this tip, security expert Mike Chapple explains how implementing application layer logging is becoming a crucial addition to every organization's security st... Tip
-
iTunes flaw could enable malicious code
Apple has fixed a critical hole that attackers could exploit to launch malicious code on PCs, including corporate clients, running the popular music software. Article
-
Security Bytes: VA slapped over credit monitoring
In other news, Symantec Corp. prepares to roll out a tool to fight data fraud and a security hole surfaces in Trend Micro Control Manager. Article
-
Malware authors eyeing Web-based applications
The recent attacks against Yahoo and Google are only the beginning, experts say, as malware authors seek out vulnerable Web applications that are often hard to secure. Article
-
Security Bytes: Malware targets Google programs
Meanwhile, Microsoft offers advice regarding a zero-day Excel flaw; a new worm exploits the World Cup craze; and hackers deface a Microsoft Web site. Article
-
Security Blog Log: Doing good with exploit code
This week, IT pros take note of the latest Microsoft patches and exploit code. Also, a look at why exploit code isn't always evil. Column
-
Quiz: Prevent phone phishing scams
SearchSecurity Retention
-
Preventing blind SQL injection attacks
Most security professionals know what SQL injection attacks are and how to protect their Web applications against them. But, they may not know that their preventative measures may be leaving their applications open to blind SQL injection attacks. SQL... Tip
Security Management Strategies for the CIO