Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Malware authors eyeing Web-based applications

    The recent attacks against Yahoo and Google are only the beginning, experts say, as malware authors seek out vulnerable Web applications that are often hard to secure. 

  • Security Bytes: Malware targets Google programs

    Meanwhile, Microsoft offers advice regarding a zero-day Excel flaw; a new worm exploits the World Cup craze; and hackers deface a Microsoft Web site. 

  • Security Blog Log: Doing good with exploit code

    This week, IT pros take note of the latest Microsoft patches and exploit code. Also, a look at why exploit code isn't always evil. 

  • Quiz: Prevent phone phishing scams

     

  • Preventing blind SQL injection attacks

    Most security professionals know what SQL injection attacks are and how to protect their Web applications against them. But, they may not know that their preventative measures may be leaving their applications open to blind SQL injection attacks. SQL... 

  • Security Bytes: Blog beatdown blamed on antispam vendor

    Meanwhile: Ohio University announces a data breach; an antispyware activist sues Yahoo; Linux gets buggier and Vista security comes under the microscope. 

  • ping of death

    On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol. 

  • How to protect the network from DoS attacks

    In this Ask the Expert Q&A, our security threat expert, Ed Skoudis, discusses how a new type of DoS attack operates and what you can do to protect your network. 

  • Zero-day flaws target 'safe' programs

    The SANS Institute says many critical flaws are appearing in programs long considered to be safe alternatives to Windows. Apple's reputation, in particular, "is in tatters." 

  • IE 'object' tag flaw found

    Attackers could launch malicious code and corrupt system memory by exploiting the latest Internet Explorer flaw. Experts suggest avoiding untrusted Web sites.