Similar Articles |
|
T.H.E. Journal February 2009 John K. Waters |
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? |
InternetNews December 17, 2008 Richard Adhikari |
Microsoft Patches IE, But Security Issues Remain As usual, the bad guys are ahead in the tug-of-war over security. |
InternetNews June 18, 2007 Andy Patrizio |
Massive Web Exploit Emerges One of the largest Web site exploits/compromises ever has hit the Web, with more than 10,000 compromised computers redirecting unsuspecting visitors to sites hosting malicious software payloads. |
InternetNews March 20, 2008 Sean Michael Kerner |
Can We Fix The Web? The problem with the modern Web is that it's insecure and fixes may be a long time coming. |
InternetNews March 20, 2007 Sean Michael Kerner |
Google: AJAX is All About Abusing Standards Developer of Google Maps argues that it is developers and not standards that are driving AJAX forward. |
Linux Journal April 2000 Nalneesh Gaur |
Assessing the Security of Your Web Applications An outline of key test areas to identify security issues in a web application and provide measures to minimize them. |
InternetNews November 21, 2008 Sean Michael Kerner |
You Could be Getting Clickjacked If you're not careful about where you click, you could become a victim of a clickjacking attack. |
InternetNews September 15, 2008 Richard Adhikari |
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. |
InternetNews January 16, 2008 Andy Patrizio |
A Particularly Nasty Week For Malware From Excel to the revitalized Storm worm to a severe banking Trojan, it's enough to make you nostalgic for the days of BBSes. |
Bank Technology News February 2007 Michael Dumiak |
Web Risk: A Growing Web's Harder To Secure As Web 2.0 applications and uses become more widespread, it'll be more than the created communities that are vulnerable. The increase of functionality, the richness of sites, creates more vectors for attack. |
InternetNews February 5, 2008 Kenneth Corbin |
MySpace Unveils Developer Platform The long-anticipated developer platform will widgetize the world's most popular social networking site. |
PC Magazine September 23, 2008 Matthew D. Sarrel |
A Day in the Life of a Web 2.0 Hacker They harvest data about you, your family, your friends, and your work directly from the Web apps you use and the sites you visit. Here's how they do it. |
InternetNews January 6, 2009 Richard Adhikari |
Fake Celeb Profiles in Spam Attacks Want to see "more" of your favorite actor or pop star? Bad idea. |
U.S. Banker May 2007 Michael Dumiak |
Web Risk: Interactive Web Entices, But Is Difficult to Secure Leading financial institutions are trying to balance the marketing and business development possibilities offered by new Web 2.0 functions with the security risks they pose. |
InternetNews September 27, 2007 Andy Patrizio |
Those Nifty Widgets Can Pack A Rude Surprise Malware finds a new target in desktop widgets that look simple and harmless but can carry a malicious payload. |
InternetNews May 19, 2006 Andy Patrizio |
Google Cleans Ajax for Java Google Web Toolkit takes regular Java apps and converts them to the often-incompatible JavaScript for all browsers. |
InternetNews August 12, 2005 Jim Wagner |
The Return of AJAX? The AJAX style incorporates a number of web standards, including XHTML, XML, XSLT, and DOM. The technique has been used in Google Maps, Amazon's A9 search engine, and Microsoft Outlook Web Access. |
InternetNews December 10, 2009 |
Fast-Moving SQL Attack Hits 125,000-Plus Sites Nasty SQL injection attack has ties to a credit card-snatching trojan - and may just be getting started. |
InternetNews April 11, 2008 Susan Kuchinskas |
Web 2.0 in Enterprise Needs a Lock Sans security controls, company-hosted blogs and wikis make it all too easy to post malware. Then, the trusting, sharing culture of Web 2.0 encourages others to click on the link. |
InternetNews October 5, 2006 Andy Patrizio |
After The Buzz, Ajax Goes To Work Ajax is an example of the whole being greater than the sum of its parts. And the big developers have all caught the Ajax religion. |
CIO February 15, 2006 Christopher Lindquist |
Ajax Arrives for the Enterprise Ajax is quickly gaining acceptance worldwide as developers look to design Web interfaces that hook users with their speed and ease of use. |
InternetNews November 19, 2007 Andy Patrizio |
Hackers Abuse Domain-Name Trust Cyber criminals have devised a new twist on the misspelled domain-name trick by hijacking IP addresses. |
InternetNews June 25, 2004 Ryan Naraine |
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. |
InternetNews August 13, 2010 |
Malware Discovered on Another Red Cross Website The Red Cross of Serbia was targeted by hackers who injected malicious JavaScript files onto several of the organization's web pages. |
InternetNews November 20, 2009 |
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. |
InternetNews June 5, 2007 Sean Michael Kerner |
Explorer, Firefox Take Heat Security researchers claim a number of zero-day flaws in both Internet Explorer and Mozilla Firefox. |
InternetNews September 5, 2007 Andy Patrizio |
Made in China: Virus-Laden Web Pages A report finds China has the most compromised Web pages serving up malware. |
InternetNews December 27, 2005 Clint Boulton |
Startups Board the AJAX Bandwagon New companies are touting AJAX, thanks to forays from Microsoft and Google. |
PC Magazine February 1, 2008 Larry Seltzer |
Don't Click That Ad . . . or Even Look at It When you go to a Web site, you have to trust everyone it's in bed with. |
InternetNews March 26, 2007 Andy Patrizio |
Russia's Latest Export To America: Malware They make it, they sell it, but we host it. Finjan finds America is cutting its own throat by hosting most of the malware on the Web. |
InternetNews September 12, 2005 Susan Kuchinskas |
MSN Kicks Out API Jams Outside developers and Web publishers can connect to MSN Search, Messenger and Virtual Earth via application programming interfaces (APIs). They are expecting to release Atlas, a toolset to help developers build Web sites incorporating asynchronous Javascript and XML (AJAX). |
PC Magazine November 30, 2005 John Clyman |
Better Web-App Interfaces with AJAX A new approach to building Web applications promises a richer experience for users. |
InternetNews July 30, 2007 Andy Patrizio |
From Russia With Larceny Latest malware kit can integrate itself into your browser to mimic your online banking site, and you'd never notice the change. |
InternetNews March 23, 2007 Sean Michael Kerner |
The AJAX World Belongs to Google Google brought the term and approach that is AJAX to the mainstream, and Google is continuing to be the guiding light in AJAX development today. |
InternetNews September 15, 2004 Ryan Naraine |
Critical Flaws Flagged in Mozilla, Thunderbird The vulnerabilities could enable malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system. |
InternetNews November 3, 2004 Sean Michael Kerner |
More IE Vulnerabilities A trio of vulnerabilities have been reported in recent days, further exposing Microsoft Internet Explorer users to the risk of potential attack from malicious users. The same bug has been reported in Apple's Safari Web browser running on OS X. |
Information Today May 19, 2008 Avi Rappoport |
The Center Is Where They Want to Be: Google Friend Connect, Yahoo! Open Strategy, MySpace Data Availability, Facebook Connect Google, Yahoo!, MySpace, and Facebook are in competition to be the single archive for user data. |
InternetNews November 9, 2007 Andy Patrizio |
MySpace Page For Alicia Keyes Hacked Crafty hackers break the site for Alicia Keyes, add redirects to a site with a rootkit. |
InternetNews November 22, 2004 Sean Michael Kerner |
Banner Ads Serving Up MyDoom A chilling turn in the war against viruses appeared over the weekend. It looks like viruses are now being spread unsuspectingly through Web sites via compromised ad servers. |
InternetNews January 30, 2008 Kenneth Corbin |
MySpace Set to Launch Developer Platform With a newly minted COO, MySpace is taking its developer site live with hopes of widgets soon rolling in. |
Information Today October 22, 2007 Erik Arnold |
Facebook Catch-Up: MySpace Confirms Developer Platform This week during the Web 2.0 conference in San Francisco, MySpace confirmed that a developer platform is imminent for the online social networking site. |
InternetNews November 23, 2004 Tim Gray |
Analysts: Expect More Ad Server Attacks Security analysts say attacks via ad servers are likely to continue. Another reason not to use Internet Explorer? |
InternetNews June 16, 2011 |
Mesh Injection Attack Claims 30,000 Sites Meshed Web attack emerges that takes a new approach to replication and it may already be a big problem. |
Linux Journal May 1, 2007 Nicholas Petreley |
Ajax Simplified Ajax can become complex as far as implementation, but the concept is quite simple. Here are the key steps involved that exploit the power of Ajax. |
InternetNews June 17, 2009 Alex Goldman |
Hacked Government and Corporate PCs for Sale A new report from Finjan says that the latest criminal markets are more sophisticated than ever before. |
ONLINE Nov./Dec. 2006 Jason A. Clark |
AJAX (Asynchronous JavaScript and XML): This Isn't the Web I'm Used To Ajax changes how users are able to interact with online content by allowing Web page data updates without the usual routine of clicking from Web page to Web page. What's in it for Libraries? |