Internet Application Security

Email Alerts

Register now to receive SearchSoftwareQuality.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Hacking for Dummies -- Chapter 16, Web applications

    Web application security is the subject of this free book excerpt. Kevin Beaver reviews application vulnerabilities, exploits, malware and countermeasures. Application hacks covered include insecure login mechanisms, directory traversal attacks and i... 

  • How to avoid LDAP injection in J2EE apps

    What is LDAP injection and how can you avoid it? Java security expert Ramesh Nagappan says it's similar to SQL injection, and stringent input validation functions will prevent it. 

  • SQL injection: Secure your Web applications

    SQL injection exploits wreak havoc on vulnerable Web sites. Expert Caleb Sima explains how to protect your applications against these popular and destructive injection attacks. 

  • CRLF injection attacks: How they work and what to do about them

    CRLF injection exploits aren't as famous as SQL or LDAP injections, but they're just as damaging to vulnerable applications. Learn how this attack works and what you can do to defend your apps. 

  • Cookie poisoning prevention in ASP.NET

    ASP.NET applications are vulnerable to cookie poisoning, and guarding against this attack is a multistep process. Expert Dan Cornell explains how to protect your apps from exploit. 

  • Ruby on Rails experiences serious security breach

    A security vulnerability has forced the creators of Ruby on Rails to issue an immediate upgrade. Version 1.1.5, which is being called a mandatory upgrade, is available now. 

  • Traversal attacks: How to secure against them

    Path traversal attacks expose sensitive data to malicious users. Protect your Web site with these solutions from expert Jeremiah Grossman. 

  • Top attack methods against Web sites identified

    "Google" hacking and directed attacks such as SQL injection and cross-site scripting are the most dangerous attack methods Web sites face, according to a new study by Fortify Software. 

  • New exploits demand multi-layer threat protection

    Application security cannot be attained without securing every layer, Amir Peles explains. Specialized attacks are proliferating, and they require specialized countermeasures. 

  • Understanding directory traversal attacks

    Directory traversal attacks are the very common, very dangerous HTTP exploits you never hear about. For the sake of your Web applications, it's time to start taking notice.