Application Attacks (Buffer Overflows, Cross-Site Scripting) News
June 02, 2016
IBM reports 30 'bug poaching' cyber extortion attacks in the past year, as black hat hackers aim to "help" enterprises by exploiting SQL injection vulnerabilities.
May 19, 2016
The ImageTragick bug raises questions over responsible disclosure, as the flaw in the ImageMagick image-processing library exposes millions of websites to remote code execution.
March 16, 2016
A security researcher reports Oracle's 30-month-old failed patch for a Java vulnerability, and experts suggest it was an irresponsible disclosure, despite frustration with Oracle's patching process.
January 22, 2016
The security researcher behind the LostPass phishing attack on LastPass has criticized the company's reaction and responses to his findings.
Application Attacks (Buffer Overflows, Cross-Site Scripting) Get Started
Bring yourself up to speed with our introductory content
Security luminary and White Ops co-founder Dan Kaminsky reveals the one common tool employed by remote attackers that is leading to a new way to detect malware. Continue Reading
On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. Continue Reading
Application blacklisting, sometimes just referred to as blacklisting, is a network administration practice used to prevent the execution of undesirable programs. Such programs include not only those known to contain security threats or ... Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Application Attacks (Buffer Overflows, Cross-Site Scripting) Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Application wrappers can help improve security for mobile devices, but there are some obstacles. Expert Michael Cobb explains the pros and cons of app wrapping. Continue Reading
Network-attached storage devices can present a plethora of security issues to an enterprise. Expert Kevin Beaver explains how to detect and mitigate the risks. Continue Reading
App attacks are multiplying. But before you buy a Web application firewall, learn about WAF technology and how it protects your apps. Continue Reading
Manage Application Attacks (Buffer Overflows, Cross-Site Scripting)
Learn to apply best practices and optimize your operations.
SearchSecurity's Risk & Repeat podcast discusses the Symantec vulnerability disclosed by Google Project Zero and what the bug means for the antivirus industry. Continue Reading
New Web security models use browser behavior and polymorphism to protect against data theft and fraud. Continue Reading
Enterprise threats expert Nick Lewis reveals two key ways to prevent SQL injection attacks without breaking the bank on an expensive code review. Continue Reading
Problem Solve Application Attacks (Buffer Overflows, Cross-Site Scripting) Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Web application security vulnerabilities exist from browser to SSL/TLS. Expert Brad Causey explains how application security testing and Web application firewalls can address this. Continue Reading
A newly discovered injection vulnerability affecting template engines could spell trouble for enterprises. Expert Michael Cobb explains how to stop it. Continue Reading
Expert Michael Cobb explains the difference between cross-site scripting and cross-site scripting inclusion (XSSI) flaws. Continue Reading