Top 10 HTML5 threats and attack vectors

Top 10 HTML5 threats and attack vectors


Top 10 HTML5 threats and attack vectors

Posted: 08 Dec 2011 06:00 AM PST

Emerging as popular standard to create Rich Internet Applications and competing with technology stacks like Adobe's Flex/Flash and Microsoft's Silverlight is HTML5. HTML5 brings several new features a...

Download.com "cleans up" Nmap but not other downloads

Posted: 08 Dec 2011 05:55 AM PST

When he discovered that Nmap was being distributed by C|Net's Download.com site bundled up with a proprietary trojan installer that installed a sketchy toolbar, changed the users' default search engin...

OpenDNS tool secures DNS traffic

Posted: 08 Dec 2011 05:08 AM PST

OpenDNS unveiled a preview of DNSCrypt, a new technology that improves both the security and privacy of Internet users, particularly those on unsecured wireless hotspots and residential ISP networks. ...

Spam run frightens with fake news about epidemic

Posted: 08 Dec 2011 04:24 AM PST

The time has come again for users to be targeted with spam emails alerting them to an epidemic raging in some part of the world: The subject line contains a simple "Fwd/Re: Epidemic in X" - X bei...

Inside the latest issue of (IN)SECURE Magazine

Posted: 08 Dec 2011 03:59 AM PST

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. The December 2011 issue features:7 questions you always wanted to ask a prof...

Germany leads Europe for USB drive data security

Posted: 08 Dec 2011 03:55 AM PST

Many organizations are ignoring the risk of unencrypted USB drives and are not following through with appropriate USB security policies. The Ponemon Institute research also denotes marked differences ...

Surge in pre-Christmas malware

Posted: 08 Dec 2011 03:21 AM PST

GFI Software released its report on the most prevalent threat detections for the previous month. Noteworthy threats in November 2011 included a new Facebook worm; the return of PDF-based malware posin...

Free tool exploits SQL injection vulnerabilities

Posted: 08 Dec 2011 03:09 AM PST

NT OBJECTives announced NTO SQL Invader, a free tool which provides pen testers and developers the ability to quickly and easily exploit and demonstrate SQL Injection vulnerabilities in Web applicatio...

Tips for securing Internet connected devices

Posted: 08 Dec 2011 02:12 AM PST

From the hottest new tablet to sleek smartphones and laptops, electronic devices are likely at the top of many consumers' holiday wish lists this year. Many lucky recipients will immediately load pers...

Free data loss prevention tool for enterprise IT

Posted: 08 Dec 2011 01:31 AM PST

STEALTHbits released of DLP Lite for File Systems, a free, regex DLP tool that aids organizations in identifying high-risk, unsecured content on their networks to mitigate the risk of data leakage and...

Secure remote access from SonicWALL

Posted: 08 Dec 2011 01:27 AM PST

The proliferation of powerful smartphones and tablets poses a new problem for IT: providing secure remote access to network resources for a growing number of employees who use their own mobile devices...

0 comments:

Post a Comment