Email Alerts
-
Web apps remain a trouble spot
Cross-site scripting and code injection have become even bigger development issues than buffer overflows. George Hulme reports the new threats to your Web applications. Article | 05 Feb 2007
-
Critical Apple flaw discovered in Mac OS X
Attackers can exploit the flaw remotely to compromise a user's system via the Safari Web browser. Article | 11 Jan 2007
-
Abobe fixes critical flaws
Adobe Reader 8 fixes flaws attackers could exploit to launch cross-site-scripting (XSS) attacks. The flaws relate to errors in how the program handles .pdf files. Article | 11 Jan 2007
-
Adobe Reader users urged to upgrade
The vendor said Adobe Reader 8 fixes serious flaws attackers could exploit for cross-site scripting and other attacks. It urged users to upgrade as soon as possible. Article | 05 Jan 2007
-
Adobe Reader flaws spook security experts
Security experts sound the alarm over Adobe Reader flaws that could be exploited for cross-site scripting attacks and other mayhem. Column | 04 Jan 2007
-
Apple QuickTime flaw could enable botnets
Attackers could exploit a new Apple QuickTime flaw to grow their botnets by tricking users into visiting malicious Web sites, and then hijacking their machines. Article | 02 Jan 2007
-
MySpace, YouTube successes open door to Web 2.0 dangers
Web 2.0, and Ajax in particular, are introducing new threats to life on the Web. Many people are rushing to add interactive features to their Web applications using Ajax, but as columnist Mike Cobb explains, security has often been overlooked. Column | 07 Dec 2006
-
Big security fixes for QuickTime, Flash Player
Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines. Article | 13 Sep 2006
-
Unpatched Windows flaws affect Help Viewer
Updated: Proof-of-concept exploits demonstrate how attackers could crash vulnerable machines or launch malicious code. But the flaws aren't nearly as serious as recently exploited Microsoft glitches. Article | 14 Aug 2006
-
Security Blog Log: Israeli-Hezbollah war spills into cyberspace
This week blogosphere warily watches online attacks inspired by the Mideast conflict and rants over the latest security incidents at AOL and the VA. Article | 11 Aug 2006
Security Management Strategies for the CIO