Email Alerts
-
Don't hide sensitive information in hidden form fields
Web security guru Michael Cobb, takes an in-depth look at the dangers of HIDDEN form fields, how attackers use them to gain unauthorized entry or hijack sessions, and most importantly, how to secure the information sent in these fields. Tip
-
Securing Web apps against authenticated users
Improve Web site security by securing Web applications from authenticated users and avoiding client-side authentication. Tip
-
Protect your Web site against path traversal attacks
How to protect your Web site against path traversal attacks. Tip
-
Deal with cross-site scripting
Learn what a cross-site scripting attack is, how it affects Web users and their systems and what developers should do to prevent future security problems. Tip
-
Improper error handling
This tip explains what improper error handling is, how it leads to a variety of application attacks, and what programmers can do to secure their Web applications. Tip
-
How to reduce risks with URL filtering
Learn how to protect your network from threats by controlling the URLs that enter and leave it. Tip
-
Five malicious code myths -- and how to protect yourself in 2005
In this tip, Ed Skoudis, takes a look at five major assumptions that were rendered untrue myths from a bygone era and how to batten down the hatches for the coming year. Tip
-
Ditch IE?
Expert Ed Skoudis explores the idea of ditching Microsoft's Internet Explorer in order to boost your security. Tip
-
Understanding malware: A lesson in vocabulary
You are better able to secure your network if you understand what you're securing it from. Tip
-
XSS - Are you aware you may be vulnerable?
Beware of cross-site scripting. Tip
Security Management Strategies for the CIO