Similar Articles |
|
InternetNews March 25, 2008 Sean Michael Kerner |
Report: 90% of Web Sites Vulnerable to Hackers New study claims Cross-Site Scripting attacks are all over the place. Should we be afraid? |
InternetNews July 18, 2007 Sean Michael Kerner |
Google's Black Box Lemon Google, the company's security team is developing a black box fuzzing tool called Lemon, which is intended to automatically find XSS problems in applications. |
PC World August 21, 2006 Andrew Brandt |
Privacy Watch: How Bad Guys Exploit Legitimate Sites What you can do to avoid falling for phishers' latest trick. |
Linux Journal October 1, 2002 Nuno Loureiro |
Programming PHP with Security in Mind Writing code that prevents some common types of attacks is rather easy -- here are some guidelines. |
InternetNews September 15, 2008 Richard Adhikari |
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. |
InternetNews September 28, 2009 |
Reddit Snuffs Out XSS Worm Social news service Reddit is in the process of recovering from a worm that pummeled the site with malicious comments. |
InternetNews December 16, 2008 Sean Michael Kerner |
'Shockers' in Cisco's Year-End Security Report But it's what didn't make it into the report that could be even more revealing. |
InternetNews February 16, 2011 |
Cenzic, Dasient Team for Web App Security At annual RSA conference, security vendors Cenzic and Dasient detail a new joint effort that combines their technology to discover and defend against Web application exploits. |
The Motley Fool June 13, 2011 Arunava De |
Are Hackers the Next Threat to Your Portfolio? Before you respond to a malicious attack on one of your investments in your portfolios, measure the impact that such an attack can have on the company. |
InternetNews September 15, 2004 Ryan Naraine |
Critical Flaws Flagged in Mozilla, Thunderbird The vulnerabilities could enable malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system. |
Search Engine Watch May 4, 2011 Simon Heseltine |
User-Generated URLs: SEO CMS Lessons Learned from Kate Middleton's Jelly Bean Avoid a PR nightmare by protecting your website before someone maliciously decides to put a campaign together that generates links to an incorrect form of your website's URL. |
InternetNews February 20, 2009 Richard Adhikari |
Group Warns of Top Web 2.0 Security Threats We can't stand in the path of progress with Web 2.0 technologies, but we can make it safer, an industry group says. |
PC Magazine February 15, 2006 Robert Lemos |
Caught by Phish Falling prey to online identity theft takes only a few minutes, but the cost can be high. |
T.H.E. Journal February 2009 John K. Waters |
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? |
PC World February 21, 2007 Erik Larkin |
Don't Let Bad Guys Pose as You Flaws let attackers trick a Web site into providing your personal information. |
InternetNews June 16, 2011 |
Mesh Injection Attack Claims 30,000 Sites Meshed Web attack emerges that takes a new approach to replication and it may already be a big problem. |
InternetNews September 25, 2009 |
Google's Chrome Frame: Making IE Less Secure? Google disputes Microsoft's claims that Chrome Frame puts users at risk. But they may both be right. |
InternetNews July 20, 2004 Ryan Naraine |
MasterCard, Others Plug Script Injection Leak Credit card giant MasterCard is among many online financial institutions rushing to fix Web site design security flaws. |
PC World March 1, 2002 Joris Evers |
PHP Security Flaws Widespread on the Web Scripting language could leave as many as 1 million Web sites vulnerable to attack, researcher says... |
InternetNews June 25, 2004 Ryan Naraine |
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. |
InternetNews April 14, 2004 Wagner & Naraine |
Stanford's Linux Supercomputers Compromised A sophisticated password sniffing program called 'John the Ripper' is behind the attacks, but officials don't see coordinated effort. |
AskMen.com Branden Peters |
How To: Avoid Getting Hacked Thankfully there are several ways to protect your information and identity from malicious attacks. Some are common sense and others require thought and money. |
Search Engine Watch November 24, 2010 Gary-Adam Shannon |
Black Hat SEO: Killing Your Competition With Google This dirty tactic can easily devalue a competitor's website, resulting in lost income and a catastrophic deindexing, all within days or even hours. |
PC World January 28, 2008 Erik Larkin |
Hackers Rig Google to Deliver Malware The latest malware trend should prompt you to think twice about the links you click next time you search. |
InternetNews August 10, 2004 Ryan Naraine |
MS Exchange 5.5 Spoofing Flaw Fixed Moderately critical vulnerability puts users at risk of cross-site scripting and spoofing attacks. |
InternetNews November 27, 2007 Sean Michael Kerner |
Firefox Fixes Cross-Site Flaws Mozilla developers plug XSS, XSRF and memory vulnerabilities in Firefox browser. |
InternetNews December 3, 2010 |
IBM Refreshes AppScan to Secure Input Validation New release of AppScan platform - version 8 - from IBM targets cross-site scripting and SAL injection vulnerabilities with string analysis for secure coding. |
InternetNews April 13, 2004 Sharon Gaudin |
Browser-based Attacks 'Surging' Virulent viruses and worms aren't the only things to watch out for. Security analysts say browser-based attacks are escalating in frequency and damage. And now a new study backs up the warnings. |
InternetNews March 29, 2011 |
Is McAfee.com Insecure? Security researchers publicly expose vulnerabilities on McAfee's website. |
InternetNews October 28, 2008 Richard Adhikari |
Yahoo Tightens HotJobs After Hackers Hit In a move that could have saved thousands of potential victims of identity theft, Yahoo techs have fixed a flaw in it's HotJobs Web site, one of the leading online job sites with thousands of subscribers. |
InternetNews July 16, 2004 Ryan Naraine |
PHP Zaps Security Leaks The PHP Group patches a pair of potentially serious vulnerabilities in the popular open-source scripting language. |
InternetNews October 16, 2007 Andy Patrizio |
A New Way to Hack Yourself Core Security Technologies updates its intrusion detection software to simulate outside attacks on your network and see how far the bad guys can get. |
Science News April 25, 2009 |
Science Past From The Issue Of April 25, 1959 There appears to be a strong link between the behavior of a man with regard to his business and social activities and his chances of being a victim of a heart attack. |
Information Today October 3, 2011 |
iCopyright Launches Article Tools + Syndication Plugin iCopyright announced the launch of unique new CMS plugins for WordPress, Drupal, and Joomla. The free plugin can be downloaded and activated in less than 5 minutes, providing any site that publishes copyrighted content with six content monetization tools. |
PC Magazine February 14, 2007 Larry Seltzer |
PDF Flaw Revealed Adobe Acrobat software lets parameters be passed to the software when a PDF file is opened. Generally speaking, this is helpful... Avoid scams when selling items online... Bank of America Online security update... |
InternetNews November 3, 2004 Sean Michael Kerner |
More IE Vulnerabilities A trio of vulnerabilities have been reported in recent days, further exposing Microsoft Internet Explorer users to the risk of potential attack from malicious users. The same bug has been reported in Apple's Safari Web browser running on OS X. |
InternetNews December 30, 2004 Tim Gray |
Trojan Threatens XP Flaw may leave Windows XP vulnerable to attack. |
CIO April 15, 2004 Eric Knorr |
Guard the Application Layer Firewalls alone are no longer enough to protect your online assets |
PC World May 23, 2001 Frank Thorsberg |
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... |
PC World June 2003 Stuart J. Johnston |
Leaky Windows Keep the Hackers Out. Plus: Take care of performance problems caused by the XP service pack. |
Salon.com April 4, 2001 Caroline Benner |
The phantom cyber-threat We should stop worrying about computer terrorism and learn who our real enemies are... |
InternetNews January 29, 2007 Michael Hickins |
Microsoft Warns of New Zero-Day Flaw Microsoft is investigating new public reports of limited "zero-day" attacks using a vulnerability in Microsoft Word 2000. |
Linux Journal May 1, 2007 Marco Fioretti |
Four Cool Ajax Plugins for WordPress Here is how to install and use four dynamite plugins for the WordPress content management system. |
InternetNews April 22, 2009 Sean Michael Kerner |
Mozilla Firefox 3.0.9 Fixes XSS Flaws Simply refreshing a site is a security risk? |
InternetNews August 19, 2004 Ryan Naraine |
IE Drag-and-Drop Flaw Warning Researchers warn that fully patched Internet Explorer users remain at risk of PC takeover attacks. |
InternetNews May 1, 2006 David Miller |
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. |
InternetNews December 10, 2009 |
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started. |
InternetNews February 1, 2010 |
Programming Errors Exacerbate Flash Flaws Foreground Security analyst Mike Bailey's trial-and-error approach to researching Adobe Flash and its security model yields some interesting - and troubling - findings for programmers. |
PC World January 24, 2007 Andrew Brandt |
Internet Explorer 7 Is Still Not Safe Enough IE 7 is definitely more secure, but phishing and malicious scripting attacks remain a problem. |
Bank Technology News July 2008 Rebecca Sausner |
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. |