Email Alerts
-
New GrayWolf tool sheds light on Microsoft .NET application security
Black Hat 2011: A free Microsoft .NET application security tool helps programmers reverse-engineer .NET applications to manipulate and control them. News | 04 Aug 2011
-
Cross-site scripting vulnerability discovered in Adobe Flash Player
Adobe issued an update Sunday repairing the Flash Player flaw in the wake of targeted email attacks attempting to exploit the flaw. News | 06 Jun 2011
-
Software code analysis firm gives security vendors poor marks
The latest study of application code by Veracode found many applications submitted by software makers are of “unacceptable security quality.” News | 20 Apr 2011
-
Hackers use blind SQL injection attack to crack Oracle-Sun, MySQL.com
Attack enabled hackers to gain access to various databases containing account credentials associated with the website. Article | 28 Mar 2011
-
Researcher breaks Adobe Flash sandbox security feature
Adobe is responding to a new method that breaks a security feature and prevents Flash files from passing data to remote systems; it is classified as "moderate" security threat. Article | 06 Jan 2011
-
Mozilla extends bug bounty to Web application vulnerabilities
Mozilla will reward vulnerability hunters for critical flaws found on a dozen Mozilla websites. Article | 15 Dec 2010
-
Cross-site scripting Twitter attack causes chaos
A cross-site scripting Twitter attack could have been exploited to spread dangerous malware and steal user data, experts said. Article | 21 Sep 2010
-
Adobe issues warning about zero-day vulnerability in Flash Player
Alert follows last week's warning of a critical flaw in Reader, Acrobat. Article | 13 Sep 2010
-
Adobe warns of critical zero-day flaw in Reader, Acrobat
No patch yet available for zero-day vulnerability that is reportedly being exploited in the wild. Article | 08 Sep 2010
-
Microsoft issues advisory on DLL load hijacking flaw
Software giant addresses application vulnerability after remote attack vector surfaces. Article | 23 Aug 2010
Security Management Strategies for the CIO