Web Application and Web 2.0 Threats News
September 18, 2015
News roundup: Additional research shows a Cisco router implant affects more devices than originally reported. Plus: Let's Encrypt's first cert issued; Tor in the library; the mitigated (but not fixed) iOS AirDrop vulnerability.
July 31, 2015
News roundup: New threats add to the Tor anonymity debate, as a new browser aims to take anonymous browsing to the next level. Plus: Android security outlook is bad -- or is it? Also, another Xen host escape flaw and Wassenaar revisions put on hold.
July 17, 2015
News roundup: Are the tides turning on mobile app safety? One white hat hacker's attempt to reverse-engineer the Subway app offers surprising results. Plus: CloudFlare Transparency Report; another call to eliminate RC4; Black Hat attendant survey.
June 19, 2015
News roundup: Details have emerged about weaknesses in OS X and iOS that allow attackers to upload malware and steal passwords and data. Plus: More jump on HTTPS bandwagon; CSO/CDO salaries increase; 23% of software app components contain flaws.
Web Application and Web 2.0 Threats Get Started
Bring yourself up to speed with our introductory content
Opportunistic encryption offers encryption for servers that don't support HTTPS. Expert Michael Cobb explains how it works and how it can help Web security. Continue Reading
Are read-only domain controllers a more secure option for setting up domain services in a DMZ than using a separate domain? Expert Kevin Beaver explains. Continue Reading
While cookies are critical to delivering personalized Web content, they are a privacy concern. Learn how adding Bloom filters to cookies can help enhance privacy while maintaining personalization. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Web Application and Web 2.0 Threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With HTML5 taking over as the preferred technology over Adobe Flash, Flash content's days are numbered. Expert Michael Cobb discusses HTML5 security and features for developers. Continue Reading
The top companies and application security products that organizations consider when they seek to reduce their application vulnerabilities. Continue Reading
Expert Michael Cobb explains how an HTTP referer header affects user privacy and outlines changes that can be made to ensure sensitive data is not leaked. Continue Reading
Manage Web Application and Web 2.0 Threats
Learn to apply best practices and optimize your operations.
Application programming interfaces are in wide use, and hackers know it. Securing APIs needs to become a top IT priority. Continue Reading
Application program interfaces, or APIs, are nothing new in the IT world, but over the past ten years, public-facing APIs have risen from a handful to over 10,000. The function of APIs is to add capabilitiies to Web applications and mobile apps, ... Continue Reading
A recent study revealed app developers that use mobile cloud backup services put user credentials at risk. Expert Rob Shapland explains how to defend against the threat. Continue Reading
Problem Solve Web Application and Web 2.0 Threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Address bar spoofing attacks can be detrimental to an organization. Expert Michael Cobb details several vulnerabilities and explains how to defend against the threat. Continue Reading
Expert Michael Cobb explains the difference between cross-site scripting and cross-site scripting inclusion (XSSI) flaws. Continue Reading
Exploit kits and malware attacks have adopted a technique called domain shadowing to stay ahead of the game. Learn what domain shadowing is and how to defend against attacks using it. Continue Reading