Application Attacks (Buffer Overflows, Cross-Site Scripting) News
January 22, 2016
The security researcher behind the LostPass phishing attack on LastPass has criticized the company's reaction and responses to his findings.
November 10, 2015
Bluebox Security unveiled a troubling study on mobile application threats and also introduced a new product to protect consumer apps on employee-owned devices.
August 06, 2015
At Agile2015, discussion turned to how a user story can offer a different approach to Agile security.
May 26, 2015
A newly discovered router vulnerability could leave millions of connected devices open to denial-of-service attacks and remote code execution.
Application Attacks (Buffer Overflows, Cross-Site Scripting) Get Started
Bring yourself up to speed with our introductory content
Security luminary and White Ops co-founder Dan Kaminsky reveals the one common tool employed by remote attackers that is leading to a new way to detect malware. Continue Reading
On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. Continue Reading
Application blacklisting, sometimes just referred to as blacklisting, is a network administration practice used to prevent the execution of undesirable programs. Such programs include not only those known to contain security threats or ... Continue Reading
Evaluate Application Attacks (Buffer Overflows, Cross-Site Scripting) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Network-attached storage devices can present a plethora of security issues to an enterprise. Expert Kevin Beaver explains how to detect and mitigate the risks. Continue Reading
App attacks are multiplying. But before you buy a Web application firewall, learn about WAF technology and how it protects your apps. Continue Reading
Microsoft Silverlight has been in the spotlight due to an increase in the number of exploit kits it is included in. Expert Nick Lewis explains the threat's severity and how to mitigate it. Continue Reading
Manage Application Attacks (Buffer Overflows, Cross-Site Scripting)
Learn to apply best practices and optimize your operations.
New Web security models use browser behavior and polymorphism to protect against data theft and fraud. Continue Reading
Enterprise threats expert Nick Lewis reveals two key ways to prevent SQL injection attacks without breaking the bank on an expensive code review. Continue Reading
Enterprise threats expert Nick Lewis examines how the BREACH attack exploits HTTPS traffic and what enterprises can do to mitigate the attack risk. Continue Reading
Problem Solve Application Attacks (Buffer Overflows, Cross-Site Scripting) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A newly discovered injection vulnerability affecting template engines could spell trouble for enterprises. Expert Michael Cobb explains how to stop it. Continue Reading
Expert Michael Cobb explains the difference between cross-site scripting and cross-site scripting inclusion (XSSI) flaws. Continue Reading
Researchers warned about the rise of a new cross-site scripting flaw involving same-origin policy. Expert Nick Lewis explains the vulnerability and how to prevent falling victim. Continue Reading