Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Flaws reported in Trend Micro ServerProtect

    Storage and security managers should be wary of vulnerabilities in the AV product that could enable a denial-of-service and malicious code execution. Workarounds are available. 

  • Roundup: 2005's 'curious malicious code'

    These viruses, worms and Trojans sometimes escaped our notice. But it didn't get past one antivirus vendor, who rounded up some of the year's stranger offerings from the underground. 

  • Microsoft issues critical fix for IE

    In addition to the long-awaited browser fix, the software giant also addressed an "important" Windows kernel flaw involving how certain procedure calls are processed. 

  • How buffer-overflow vulnerabilities occur

    Learn about buffer-overflow vulnerabilities; how they occur, types of buffer-overflow attacks, and how hackers exploit them to gain access to secure and sensitive files. 

  • How to prevent application attacks and reduce network vulnerabilities

    In this Ask the Expert Q&A, our application security guru discusses how hackers exploit network vulnerabilities to attack your applications and what you can do to mitigate this risk. 

  • Apple patches 13 flaws in Mac OS X

    Attackers could gain unauthorized system access, compromise sensitive data and launch malcode by exploiting a series of security holes in Mac OS X. But patches are available. 

  • Five common application-level attacks and the countermeasures to beat them

    This tip reviews five of the most common attacks against applications: injection vulnerabilities, cross-site scripting (XSS), broken authenticcationa nd session management, insecure direct object references and security misconfiguration. Michael Cobb... 

  • Exploit code targets IE memory corruption flaw

    Update: Security experts warn of proof-of-concept code for a memory corruption flaw in Internet Explorer. One firm recommends disabling Active Scripting, and explains how. 

  • Security Bytes: FTC cracks down on alleged spyware distributors

    Patches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion suffers... 

  • Security Bytes: Did adware maker help bust botnet?

    Elsewhere: Juniper hires a controversial researcher while vulnerabilities plague Macromedia Flash Player 7 and Apple QuickTime.