Email Alerts
-
Internet Explorer open to spoofing, scripting attacks
A zero-day vulnerability in Internet Explorer (IE) leaves the browser open to an attack that could allow someone to capture the keystrokes of a victim. Article | 01 Jul 2008
-
Software still plagued with security holes, researcher says
In this podcast, noted security researcher Greg Hoglund, who specializes in Windows rootkits and secure coding, explains why software is just as vulnerable today as it was in 1999. Article | 30 Jun 2008
-
Microsoft tools won't be quick fix for SQL injection attacks
Microsoft's security advisory will help raise awareness about secure software coding, but it won't stop the onslaught of SQL injection attacks, experts say. Article | 25 Jun 2008
-
Microsoft identifies tools to address SQL injection attacks
On the heels of a tidal wave of SQL injection attacks in recent months, Microsoft issued an advisory to identify tools that could help stave off the attacks. Article | 24 Jun 2008
-
Adobe Flash Player flaw previously patched, Symantec says
Security researchers said the threat is minimal, because attacks in the wild are targeting previous versions of Adobe's media player. Article | 29 May 2008
-
Adobe zero day flaw being actively exploited in wild
Researchers discovered more than 200,000 Web pages set up to exploit a zero day in Adobe Flash Player. Article | 28 May 2008
-
New wave of SQL injection attacks alarm researchers
Researchers are uncovering a wave of SQL injection attacks, suggesting that attackers are finding it easy to compromise new targets. Article | 21 May 2008
-
Kaminsky on DNS rebinding attacks, hacking techniques
Noted network security researcher Dan Kaminsky, director of penetration testing at IOActive, shares his research on Web-based attack techniques. Article | 14 May 2008
-
Yahoo, McAfee to warn users of dangerous websites
Websites suspected of spreading malicious programs or spamming and phishing campaigns will be highlighted in search results. Article | 06 May 2008
-
SQL injection attack infects hundreds of thousands of websites
Security experts are watching massive numbers of automated SQL injection attacks from Chinese domains. Attackers use simple search engine queries to build a list of targets. Article | 30 Apr 2008
Security Management Strategies for the CIO