Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Symantec fixes 'critical' Veritas flaw

    Attackers could launch malicious code by exploiting a security hole in Veritas NetBackup servers and clients. But Symantec has released a fix. 

  • Don't discount software distribution sites as attack vectors

    There's a potential downside to update sites, which offer virtually untapped riches to bad guys wanting to compromise your network. Just ask the author. 

  • September sees surge in IM threats

    Instant messaging programs are becoming a favorite target among malicious code writers, according to one security vendor. 

  • cache poisoning (domain name system poisoning or DNS cache poisoning)

    Cache poisoning, also called domain name system (DNS) poisoning or DNS cache poisoning, is the corruption of an Internet server's domain name system table by replacing an Internet address with that of another, rogue address. 

  • DOS (Disk Operating System)

    DOS (Disk Operating System) was the first widely-installed operating system for personal computers. 

  • Symantec threat report: A closer look

    Details of the enterprise security provider's latest customer data. 

  • Deal with cross-site scripting

    Learn what a cross-site scripting attack is, how it affects Web users and their systems and what developers should do to prevent future security problems. 

  • ISP liability: Does the bot stop here?

    In the first of a two-part analysis of ISPs' culpability in the growing number of compromised computers, legal experts explain why mandating more traffic controls is a bad idea. 

  • The rise of Windows-based rootkits

    In this Ask the Expert Q&A our application security expert discusses how and why rootkits have become more sophisticated in the Windows environment. He also provides a variety of resources to help you protect your system from this security threat. 

  • stack smashing

    Stack smashing is causing a stack in a computer application or operating system to overflow.