Sean Michael Kerner Avatar
  • Yahoo Password Breach Puts SQL Injection In the Crosshairs

      SQL Injection has long been identified as one of the top vulnerabilities affecting web applications. Even though SQL Injection attack vectors are well known, it’s an attack that keeps…

  • Understanding the Flame Malware

    While most Americans enjoyed a long holiday weekend, researchers in the security community were working around the clock to unravel the mysteries of one of the most intimidating pieces of…

  • Google Wallet Compromised with Hackers Access to PIN & Funds

    What would happen if you lost your wallet to a thief? It’s a question that Google Wallet users on Android phones are asking themselves in the wake of multiple reports…

  • Protecting Against SQL Injection Attacks with Oracle Database Firewall

    Exploits that take advantage of SQL Injection (SQLi) vulnerabilities in software are among the most dangerous and prevalent attacks on the Internet today. In a SQLi attack, hackers typically take…

  • Which Browser is the Most Secure?

    Editor’s Note: An updated version of this article can be found here: Which Browser is Best for Security? For as long as there has been more than one browser, users…

  • Detecting Malicious Traffic in HTTP Headers

    In the battle against malicious traffic and infected websites, security researchers are always looking for new avenues of detection. According to Trustwave Security Researcher Rodrigo Montoro, one such approach could…

  • Fraudulent SSL Cert for Google Revoked

    SSL is supposed to protect web users by encrypting data. When it comes to trusting an SSL certificate, Web browsers rely on authoritative certificate authorities (CA) that validate the authenticity…

  • WordPress Gets Clickjacking Protection

    The open source WordPress blogging application is being updated to version 3.1.3 this week adding multiple security fixes and improvements. Among the fixes is a moderately critical patch for arbitrary…

  • IronBee Open Source WAF Project Launches

    Web Application Firewall (WAF) technology is seen by manyas a much needed technology for Web application security. In the open source world, the ModSecurity project has helped to lead the…

  • IBM AppScan Takes Aim at Input Validation

    Cross-site scripting (XSS) and SQL injection flaws are among the most common and lethal types of security vulnerabilities. Both sets of flaws often stem from the same root cause, which…


Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies