Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Security Wire Weekly: Sourcefire update, new Symantec report, bruised Apple and infosec pros unstain

    This week's podcast features Forrester's Paul Stamp on Check Point's beleaguered Sourcefire acquisition, plus details on a new Symantec report, Apple's latest black eye and why BlackBerry never squeezed security pros. Listen on your PC or download to... 

  • Attacks driven by love of money

    Symantec's latest threat report shows digital desperadoes are exploiting Web application flaws and using "modular" malcode to launch lucrative attacks. 

  • State-based attacks: Session management

    In this excerpt from Chapter 4 of "How to Break Web Software: Functional and Security Testing of Web Applications and Web Services," authors Mike Andrews and James A. Whittaker identify session management techniques Web developers should use to prote... 

  • Content Spoofing

    This excerpt from "Preventing Web Attacks with Apache" explains how content spoofing attacks exploit vulnerabilities and how to use Apache to protect against them. 

  • Man-in-the-middle attacks

    This excerpt from Chapter 2 of "Securing Storage: A Practical Guide to SAN and NAS Security" examines how man-in-the-middle attacks affect Fibre Channel security and examines how to determine if your organization is at risk. 

  • Bingo card authentication systems

    In this Ask the Expert Q&A, our identity and access management expert explains what a "bingo" card authentication system is, how it works and how secure it is. 

  • Security Wire Weekly audio downloads

    Get the week's top information security news while you're commuting to work or at the gym -- whenever it's convenient to you! Listen to our Security Wire Weekly audio downloads by SearchSecurity's award-winning news team and stay in the know. 

  • Microsoft warns of fresh IE, Windows flaws

    Attackers could exploit an Internet Explorer flaw to launch malicious code. Meanwhile, a Windows glitch could allow elevated system privileges. 

  • Exploit code targets Windows help system

    Attackers could take advantage of a flaw in Microsoft HTML Help Workshop to cause a buffer overflow or launch malicious code. Exploit code is in the wild. 

  • Mozilla issues Firefox mega-fix

    The digital underground could exploit as many as seven flaws to bypass security restrictions, compromise sensitive data and launch cross-site scripting attacks.