Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Bots in the A/C, spyware in the 'fridge

    Someday, hackers will target the computers in your air conditioner, refrigerator and TV. What can security professionals do about it? 

  • Securing Web apps against authenticated users

    Improve Web site security by securing Web applications from authenticated users and avoiding client-side authentication. 

  • Using OS Security's OSsurance

    In this Ask the Expert Q&A, our application security expert takes an in-depth look at OS Security's OSsurance tool and discusses how it can help protect against a variety of application-based attacks. 

  • Powerful payloads: The evolution of exploit frameworks

    Attackers have new tools to launch faster, more powerful attacks. Contributor Ed Skoudis offers up some examples, some of which are very clever and very evil. 

  • Protect your Web site against path traversal attacks

    How to protect your Web site against path traversal attacks. 

  • Snort update fixes security hole

    Attackers could exploit a flaw in the open source IDS to gain unauthorized network access, security firms warn. But a fix is available. 

  • Security Bytes: New malware targets Skype users

    In other news, a Microsoft patch causes problems while a Lynx flaw affects Red Hat and Ubuntu Linux distributions. 

  • dictionary attack

    A dictionary attack is a method of breaking into a password-protected computer or server by systematically entering every word in a dictionary as a password. A dictionary attack can also be used in an attempt to find the key necessary to decrypt an e... 

  • directory harvest attack (DHA)

    A directory harvest attack (DHA) is an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database. 

  • Quiz: What's your infosec IQ?

    Test your information security IQ with this short quiz.