IT Management  >   Systems Operations  >   Security  >  

Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Day-zero Threats, Zero Day Threats, Internet Threats, Security Breaches, Virus Threats, Day Zero Threats, Computer Security Threats, Network Security Threats, Threat Mitigation, Network-level Threats, Network Threats, Network Level Threats, Spyware Threats, Internet Security Threats, Application Security Threats, Threat Management, Software Security Threats, Information Security Threats, Threats, Web Threats
DEFINITION: Parameter tampering is a form of Web-based attack in which certainparameters in the Uniform Resource Locator (URL)or Web page form field data entered by a user are changed without that user's authorization. Thispoints the browserto a link, page or site other than the one the user intends (although it may look exactly the sameto the casual observer).Parameter tampering can be employed by criminals and  … 
Definition continues below.
Security Threats Reports
51 - 75 of 1951 Matches Previous Page  |  Next Page
Top 10 Web Hacking Techniques of 2014
sponsored by White Hat Security
WEBCAST: In this webcast, you'll learn the top 10 web hacking techniques of 2014 and how to protect your network as we continue through 2015.
Posted: 09 Apr 2015 | Premiered: Apr 9, 2015

White Hat Security

A Holistic Approach to Fending off Bots and Bot Networks
sponsored by Distil Networks
WHITE PAPER: In this white paper, discover how a cloud-based strategy can block bots in real-time before data and intellectual property theft can occur. View now to learn more.
Posted: 09 Apr 2015 | Published: 04 Feb 2015

Distil Networks

Application Self Defense: Reducing the Impact of High Attack Volume
sponsored by Prevoty
CASE STUDY: This case study outlines how one sports media organization moved beyond threat detection and into real-time prevention against cross-site scripting (XSS), SQLi, and malware attacks. Read on to examine the solution that they chose and if it's right for your organization.
Posted: 09 Apr 2015 | Published: 01 Apr 2015

Prevoty

Keeping Healthcare Data Protected
sponsored by HP Security Voltage
EGUIDE: This expert e-guide lays out the steps to take to align payers and providers to reduce the costs of care and protect sensitive data. Additionally, read on to learn more about the Anthem data breach.
Posted: 09 Apr 2015 | Published: 25 Mar 2015

HP Security Voltage

Advanced Threat Protection Lifecycle Defense
sponsored by Blue Coat Systems
WHITE PAPER: In this infographic, discover a method of advanced threat protection that fights every step of the advanced threat lifecycle.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

Blue Coat Systems

2015 Cyberthreat Defense Report
sponsored by Blue Coat Systems
WHITE PAPER: This report, which focuses specifically on IT security management, uses research to reveal what areas of security you should turn your attention to.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

Blue Coat Systems

The Rise of Web Bot Attacks and Demise of Traditional Defenses
sponsored by Distil Networks
WHITE PAPER: This white paper details why ad hoc bot security approaches continue to fail and explores a new approach to blocking bots. View now to learn how you can close security vulnerability gaps to hackers' attempts.
Posted: 07 Apr 2015 | Published: 18 Feb 2015

Distil Networks

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and vulnerabilities and presents an encrypted traffic management approach to mitigating risks.
Posted: 07 Apr 2015 | Published: 09 Dec 2013

Blue Coat Systems

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper walks you through security policies to ensure that data doesn't leak out through encrypted tunnels. Read on now to learn how to improve your security strategy.
Posted: 07 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

Detect Ransomware Before it’s Too Late
sponsored by AlienVault
WEBCAST: In this webcast, learn how to detect ransomware and protect your network before it's too late.
Posted: 07 Apr 2015 | Premiered: Apr 7, 2015

AlienVault

Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

How to Choose A Certificate Authority for Safer Web Security
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper sheds light on the seven measures a trustworthy CA needs to take and how to choose a reliable CA.
Posted: 07 Apr 2015 | Published: 06 Nov 2013

GeoTrust, Inc.

4 Steps to Simplifying SSL Management
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper outlines the three challenges of SSL certificates and why the ad hoc security approach fails. View now to explore a new approach to simplifying SSL certificate management and reducing complexity in four steps.
Posted: 07 Apr 2015 | Published: 16 Oct 2013

GeoTrust, Inc.

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores why SSL/TSL decryption and inspection methodologies are being abandoned in favor of more strategic approaches. View now to learn the three crucial characteristics of and how to improve the resiliency and performance of your network security strategy.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Blue Coat Systems

SSL Accerleration Checklist
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores the challenges of SSL management and offers steps to remedy them. Read on to explore the critical requirements checklist for an SSL acceleration platform.
Posted: 06 Apr 2015 | Published: 09 Oct 2013

Blue Coat Systems

Combating Password Sharing and Misuse with IAM
sponsored by SailPoint Technologies
EGUIDE: In this expert eguide, explore the staggering statistics of irresponsible password use and how IAM can save your organization from being in the next breach headline.
Posted: 06 Apr 2015 | Published: 11 Mar 2015

SailPoint Technologies

The Business Value of a Comprehensive All-in-OneData Protection Solution for Your Organization
sponsored by Asigra
WHITE PAPER: Access this white paper to learn how to develop a comprehensive data protection strategy to have transparent visibility and complete control. View now to explore the five common failures of data protection and how to overcome each.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Asigra

Choosing the Right Security Solution: Moving Beyond SSL
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paperpresents a buyer's guide to choosing a next-gen SSL platform to secure consumer personal information and enterprise data. View now to learn the tell-tale signs of a faulty platform and the key characteristics to look for in a trusted strategy.
Posted: 03 Apr 2015 | Published: 06 Nov 2013

GeoTrust, Inc.

Three-Pronged Approach to Improving Physical Security
sponsored by Modulo
WHITE PAPER: View this white paper to discover how to improve the physical protection of data through a three-pronged approach and how people, processes, and technologies can be used to minimize the disruption of information losses. Access now to learn more.
Posted: 02 Apr 2015 | Published: 04 Feb 2015

Modulo

Top Selection Criteria for an Anti-DDoS Solution
sponsored by Radware
WHITE PAPER: Access this white paper now for a comprehensive list of the questions you need to ask potential vendors before choosing their service.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Radware

TSL/SSL: Best Practices and Applications
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, explore how TLS works and the 14 best practices for its use. View now to learn why a trusted Certificate Authority is needed and more.
Posted: 02 Apr 2015 | Published: 02 Jan 2014

Symantec Corporation

4 Ways DNS Can Enhance Online Traffic & Security
sponsored by Neustar®
WHITE PAPER: In this white paper, discover 4 ways to optimize your DNS for better business and tighter security.
Posted: 02 Apr 2015 | Published: 11 Nov 2013

Neustar®

Streamlining Information Protection Through a Data-centric Security Approach
sponsored by HP Security Voltage
WHITE PAPER: This resource introduces a new strategy that combines data encryption and masking to simplify privacy management and mitigate leakage. View now to learn the five step plan to successful production data protection.
Posted: 02 Apr 2015 | Published: 02 May 2013

HP Security Voltage

Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

Shellshock In Action
sponsored by Trend Micro
VIDEO: In this demonstration video, see the shellshock bug in action and how easy it is for attackers to take advantage of it to gain access to your systems. Discover a technology that adds protection for shellshock bugs by adding an intrusion prevention system in order to protect your systems.
Posted: 01 Apr 2015 | Premiered: 01 Apr 2015

Trend Micro
51 - 75 of 1951 Matches Previous Page    1 2 3 4 5 6    Next Page
 
SECURITY THREATS DEFINITION (continued): …  identitythieves to surreptitiously obtain personal or business information about the user.Countermeasures specific to the prevention of parameter tampering involve the validation of allparameters to ensure that they conform to standards concerning minimum and maximum allowablelength, allowable numeric range, allowable character sequences and patterns, whether or not theparameter is actually required to conduct the transaction in question, and whether or not null isallowed.Whitelisting(accepting only allowable input) is more effective than blacklisting(refusing to accept forbidden input). A Web … 
Security Threats definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement