Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Security Blog Wire: Symantec flaw parallels Sony BMG

    This week's blog roundup focuses on Symantec and whether it borrowed a page from the Sony BMG playbook by using a hidden program. 

  • Apple fixes multiple QuickTime security flaws

    Attackers could use maliciously crafted images or media files to cause a denial of service or launch malicious code. A new version of QuickTime fixes the problems. 

  • Security Bytes: Symantec warns of more WMF glitches

    In other news, two accused of bogus spyware claims settle with the Federal Trade Commission while a feared Sober explosion fails to materialize. 

  • Experts express concern over WMF patch delay

    Security experts agree that a large-scale exploit is possible while users wait for next week's Windows Meta File patch. In the meantime, experts advise managers to educate users about what sites they should and shouldn't visit. 

  • Microsoft releases WMF patch early

    The software giant released a patch for the much-exploited flaw at 4 p.m. ET Thursday. Additional security updates are scheduled for next week. 

  • Security Bytes: Flaws found in BlackBerry Server

    In other news, Social Security numbers of H&R Block customers are reportedly exposed and multiple vulnerabilities are found in the Linux kernel. 

  • Spyware, application attacks to be biggest 2006 threats

    Security experts say virus writers will turn their attention to spyware in the year ahead, victimizing many still-unsuspecting users. Application-specific attacks, phishing and data exposures will also plague security pros. 

  • Gaining access using application and operating system attacks

    In this excerpt from Chapter 7 of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition, authors Ed Skoudis and Tom Liston explain how security professionals can use exploit frameworks to their advanta... 

  • Don't hide sensitive information in hidden form fields

    Web security guru Michael Cobb, takes an in-depth look at the dangers of HIDDEN form fields, how attackers use them to gain unauthorized entry or hijack sessions, and most importantly, how to secure the information sent in these fields. 

  • Security updates fix Macromedia flaws

    Attackers could exploit vulnerabilities to bypass security controls, gain administrative privileges and cause a denial-of-service. But fixes are available.