Email Alerts
-
Cross-site scripting Twitter attack causes chaos
A cross-site scripting Twitter attack could have been exploited to spread dangerous malware and steal user data, experts said. Article
-
Adobe issues warning about zero-day vulnerability in Flash Player
Alert follows last week's warning of a critical flaw in Reader, Acrobat. Article
-
Adobe warns of critical zero-day flaw in Reader, Acrobat
No patch yet available for zero-day vulnerability that is reportedly being exploited in the wild. Article
-
Microsoft issues advisory on DLL load hijacking flaw
Software giant addresses application vulnerability after remote attack vector surfaces. Article
-
Why it's important to turn on DEP and ASLR Windows security features
In the quest for application security, many developers are disabling or incorrectly implementing two important Windows security features. In this expert response, Michael Cobb explains why ASLR and DEP should always be turned on. Ask the Expert
-
Black Hat conference 2010: News, podcasts and videos
Get updates on the latest happenings at the Black Hat 2010 conference with breaking news stories, and exclusive video and podcasts. Conference Coverage
-
An application security framework for infrastructure security managers
Video: Get a primer on common application attack methods and an application security framework to help infrastructure security teams. Video
-
Adobe offers patch timetable for critical flaw
The first round of patches for a critical flaw in Adobe's Flash Player, Adobe Reader and Acrobat products will come this week, with more to come by the end of the month. News
-
Enterprise PDF attack prevention best practices
Malicious PDF exploits are at an all-time high. Should enterprises dump PDFs altogether? Expert Michael Cobb answers that question and offers his key enterprise PDF attack prevention tactics. Tip
-
Should black-box, white-box testing be used together?
Learn why black-box, white-box testing should be used together when searching for Web application code vulnerabilities. Ask the Expert
Security Management Strategies for the CIO