Email Alerts
-
cyberterrorism
According to the U.S. Federal Bureau of Investigation, cyberterrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub... Definition
-
Adobe Acrobat Reader security: Can patches be avoided?
Security expert Michael Cobb counters recent advice from Fiserv not to install Adobe Reader patches and says these updates are vital to security and must trump user functionality. Ask the Expert
-
SANS Top 25 programming errors: Application security best practices
Learn the SANS Top 25 programming errors and the best practices for application security. Ask the Expert
-
Researcher's fuzz testing finds dozens of Apple, Microsoft flaws
Using a fuzzing method, researcher Charlie Miller of Independent Security Evaluators found flaws in Apple, Microsoft and Adobe Acrobat. Article
-
Adobe issues emergency update, repairs critical Reader flaw
Adobe said a critical vulnerability could cause the application to crash and potentially allow an attacker to install malware and take control of the affected system. Article
-
Quiz: Securing the application layer
Take this quiz to test your knowledge of the information presented in the Integration of Networking and Security school lesson on securing the application layer. Quiz
-
Adobe addresses critical Flash flaw, plans Reader security update
Critical update due out today affects users of Adobe Reader for Windows, Macintosh and Unix. Article
-
Improving software with the Building Security in Maturity Model (BSIMM)
Learn about the Building Security in Maturity Model (BSIMM), a software security framework that emphasizes attack models, software security testing, code review and compliance policies. Also, does your company have a software security group (SSG)? Tip
-
Latest zero-day attacks only target IE 6, Microsoft says
Security protections in newer versions of Internet Explorer help defend against ongoing attacks. Software giant urges users to implement workarounds. Article
-
Social networking security: Twitter, Facebook hacker attacks climbing
Roundup: Get the latest news on social networking security and stay up to date on the tactics, methods and techniques that cybercriminals are using to break into Twitter, Facebook, and other social network accounts to steal data. Article
Security Management Strategies for the CIO