Email Alerts
-
What causes buffer overflows and memory leaks in a Web application?
Buffer overflows and memory leaks can cause serious harm to Web applications. In this SearchSecurity.com Q&A, application security expert Michael Cobb reveals how both can lead to security breaches and system compromises. Ask the Expert
-
Cross-site tracing vs. Cross-site scripting
Cross-site tracing, slightly different from cross-site scripting, can still do some significant damage to your Web applications. In this SearchSecurity.com Q&A, information security threats expert Ed Skoudis reveals how each attack is carried out. Ask the Expert
-
What are application logic attacks?
In 2005, application logic flaws allowed alert, Web-savvy gamblers the chance to win a lot of money. In this SearchSecurity.com tip, application security expert Michael Cobb examines these types of vulnerabilities and how they can lead to application... Ask the Expert
-
If a virtual machine is hacked, what are the consequences?
In our expert Q&A, information security threats expert Ed Skoudis explains how attackers can compromise a virtual machine. Ask the Expert
-
What new tactics can prevent cross-site scripting attacks?
Cross-site scripting attacks are a major threat to today's information security environment. In this expert Q&A, Ed Skoudis reveals how attackers use this technique to exploit vulnerable Web sites. Ask the Expert
-
How to prevent input validation attacks
Learn what canonicalization is and what Web developers can do to prevent input validation attacks. Ask the Expert
-
How to prevent cross-site scripting
Learn how cross-site scripting, a common Web application attack, operates and what Web users and Web developers can do to protect against it, in this information security threats Ask the Expert Q&A. Ask the Expert
-
How to protect the network from DoS attacks
In this Ask the Expert Q&A, our security threat expert, Ed Skoudis, discusses how a new type of DoS attack operates and what you can do to protect your network. Ask the Expert
-
Bingo card authentication systems
In this Ask the Expert Q&A, our identity and access management expert explains what a "bingo" card authentication system is, how it works and how secure it is. Ask the Expert
-
How buffer-overflow vulnerabilities occur
Learn about buffer-overflow vulnerabilities; how they occur, types of buffer-overflow attacks, and how hackers exploit them to gain access to secure and sensitive files. Ask the Expert
Security Management Strategies for the CIO