Email Alerts
-
Will Firefox security improve with browser plug-in check?
Will Mozilla's possible support of a browser plug-in check improve Firefox security? Expert Nick Lewis discusses the pros and cons of the feature. Answer
-
SEO poisoning (search poisoning)
Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up prominently in search results. The sites associated with the links may infect visitors with malware or fraudulently access... Definition
-
Spam campaign abuses flaw tricking thousands with shortened .gov URLs
Spammers have spoofed shortened URLs designed to validate redirects to several states including California, Iowa, Indiana and Vermont. News
-
Web Application Security
This series looks at Web application threats, secure software development practices and the challenge of finding and fixing Web application vulnerabilities. partOfGuideSeries
-
Microsoft to issue emergency Internet Explorer update Friday
A temporary automated fix plugging the dangerous flaw is available until an official patch is released. News
-
H.264 vs Flash: Using the H.264 codec as a secure Flash alternative
Can the H.264 video codec serve as a more secure Flash alternative? Expert Nick Lewis provides a security breakdown of H.264 vs Flash. Answer
-
Java sandboxing could thwart attacks, but design may be impossible
Basic Java sandboxing has been around since 1995, but flaws in the Java virtual machine are highly targeted. Experts are calling on Oracle to do more. News
-
The SSL handshake process: Public and privates keys explained
Expert Michael Cobb details the SSL handshake and the role of public and private keys in a C2B transaction. Answer
-
The security benefits of silent updates: Timing is everything
In light of the increasing popularity of silent updates, expert Michael Cobb examines their security and application-compatibility implications. Answer
-
Google Pwnium hacking contest backed with $2 million in rewards
The search engine giant is doubling its payout when it holds its Pwnium 2 hacking contest in October at the Hack In the Box conference in Malaysia. News
Security Management Strategies for the CIO