Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Can fuzzing identify cross-site scripting (XSS) vulnerabilities?

    Fuzzing may find weaknesses in software, but the testing process can't find every flaw. Ed Skoudis explains what other tools are necessary when looking for cross-site scripting vulnerabilities. 

  • Can Snort stop application-layer attacks?

    Even though Snort can add an important layer of defense for applications, it won't fix the underlying problem of poorly written ones. Michael Cobb reveals a more efficient technique for patching up XSS and SQL injection vulnerabilities. 

  • What causes buffer overflows and memory leaks in a Web application?

    Buffer overflows and memory leaks can cause serious harm to Web applications. In this SearchSecurity.com Q&A, application security expert Michael Cobb reveals how both can lead to security breaches and system compromises. 

  • Cross-site tracing vs. Cross-site scripting

    Cross-site tracing, slightly different from cross-site scripting, can still do some significant damage to your Web applications. In this SearchSecurity.com Q&A, information security threats expert Ed Skoudis reveals how each attack is carried out. 

  • What are application logic attacks?

    In 2005, application logic flaws allowed alert, Web-savvy gamblers the chance to win a lot of money. In this SearchSecurity.com tip, application security expert Michael Cobb examines these types of vulnerabilities and how they can lead to application... 

  • If a virtual machine is hacked, what are the consequences?

    In our expert Q&A, information security threats expert Ed Skoudis explains how attackers can compromise a virtual machine. 

  • What new tactics can prevent cross-site scripting attacks?

    Cross-site scripting attacks are a major threat to today's information security environment. In this expert Q&A, Ed Skoudis reveals how attackers use this technique to exploit vulnerable Web sites. 

  • How to prevent input validation attacks

    Learn what canonicalization is and what Web developers can do to prevent input validation attacks. 

  • How to prevent cross-site scripting

    Learn how cross-site scripting, a common Web application attack, operates and what Web users and Web developers can do to protect against it, in this information security threats Ask the Expert Q&A. 

  • How to protect the network from DoS attacks

    In this Ask the Expert Q&A, our security threat expert, Ed Skoudis, discusses how a new type of DoS attack operates and what you can do to protect your network.