Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Improper error handling

    This tip explains what improper error handling is, how it leads to a variety of application attacks, and what programmers can do to secure their Web applications. 

  • UPDATED: Zotob exploits Microsoft Windows flaw

    Security experts are worried by how fast Zotob was developed to exploit Microsoft Windows' Plug and Play flaw. A more damaging worm could be launched with equal speed. 

  • How to reduce risks with URL filtering

    Learn how to protect your network from threats by controlling the URLs that enter and leave it. 

  • Web Security School Lesson 3

    In Lesson 3 of Web Security School, Michael Cobb teaches you how to plan and implement Web directory structures and permissions, and manage secure Web development. Also, a primer on secure coding and data management, and procedures for combating Web ... 

  • Hacking Windows: MSRPC vulnerabilities

    In this excerpt from "Hacking Exposed, Fifth Edition: Network Security Secrets & Solutions," authors Stuart McClure, Joel Scambray and George Kurtz introduce MSRPC vulnerabilities and countermeasures. 

  • jolt

    On the Internet, jolt is a denial of service (DoS) attack caused by a very large ICMP packet that is fragmented in such a way that the targeted machine is unable to reassemble it for use. 

  • Five malicious code myths -- and how to protect yourself in 2005

    In this tip, Ed Skoudis, takes a look at five major assumptions that were rendered untrue myths from a bygone era and how to batten down the hatches for the coming year. 

  • Fixes, workaround for Kerberos 5 vulnerability

    A security hole could be exploited to launch malicious code. But there are fixes and a workaround. 

  • Infected ad banners exploit IE's IFRAME flaw

    Experts recommend IE users switch to another browser or disable Active Scripting to guard against infected ad banners exploiting the IFRAME vulnerability. 

  • 'Highly critical' flaw in RealPlayer, RealOne

    An attacker could use a buffer overflow vulnerability in RealPlayer and RealOne Player to launch malicious code, but a fix is available.