Book excerpt: Investigating Internet Crimes

Web Server Threats and Countermeasures

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • DNS worm strikes at Microsoft flaw

    A new worm called Rinbot.BC exploits the Microsoft DNS flaw by installing an IRC bot on infected machines and scanning for other vulnerable servers. 

  • How can hackers bypass proxy servers?

    Hackers are bypassing proxy servers all the time and doing so for a variety of reasons. In this expert Q&A, Ed Skoudis points out the holes in your protective filtering tools. 

  • What are the best ways to block proxy server sites?

    Proxy services allow employees to view unauthorized content, but the proxies themselves and the sites that list them are tricky to detect. In this Q&A, learn how some content monitoring tools can help block proxy server sites. 

  • How to implement IIS authentication settings

    In this Q&A, identity management and access control expert Joel Dubin reviews how to set IIS authentication permissions and allow open access to Web sites hosted on the server. 

  • How to ensure that an SSL connection protects sensitive Web data

    In this expert Q&A, application security pro Michael Cobb explains how to secure sensitive Web site data that is sent across the Internet. 

  • Are USB storage devices a serious enterprise risk?

    USB drives are common gifts at conferences and trade shows, but how much of a danger are they to your enterprise's network security? In this expert Q&A, Michael Cobb explains the risks of these storage devices and how to control their use. 

  • How well do content filtering tools limit network traffic?

    Newer content filtering products are available, but are they worth the investment? In this Q&A, network security expert Mike Chapple explains the technology behind content monitoring/filtering tools and whether you should wait for ... 

  • Controlling U3 smart drive use in the enterprise

    Many users have loaded Skype on U3 smart drives to get around their company's security policy. In this expert Q&A, application security pro Michael Cobb explains the best ways to control the use of mobile storage devices and protect the confidentiali... 

  • Mobile carriers admit to malware attacks

    Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small. 

  • Dozens of Web sites spread malicious Trojan

    Update: The same malicious JavaScript keylogger that compromised the Dolphin Stadium Web site last week was found over the weekend on dozens of other high-profile Web sites.