Application attacks (buffer overflows, cross-site scripting)

Get the latest news and information on recognizing vulnerabilities and defending against application attacks and threats such as buffer overflows, cross site scripting, SQL injections.

Application attacks (buffer overflows, cross-site scripting) News

Application attacks (buffer overflows, cross-site scripting) Get Started

Bring yourself up to speed with our introductory content

  • process hollowing

    Process hollowing is a security exploit in which an attacker removes code in an executable file and replaces it with malicious code. Continue Reading

  • How do buffer overflow attacks work?

    Buffer overflow attacks are simple exploits that can give an attacker control over a program or process. Learn how these attacks work and how to make sure they don't happen to you. Continue Reading

  • cyberterrorism

    According to the U.S. Federal Bureau of Investigation, cyberterrorism is any 'premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by ... Continue Reading

Evaluate Application attacks (buffer overflows, cross-site scripting) Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Manage Application attacks (buffer overflows, cross-site scripting)

Learn to apply best practices and optimize your operations.

Problem Solve Application attacks (buffer overflows, cross-site scripting) Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close