Securing Cross Site XMLHttpRequest

Monday, June 23rd, 2008

As I mentioned in my post on Cross Document Messaging, client side cross domain request is an important area of interest for AJAX developers looking for ways to avoid expensive server side proxying calls. While Cross Document Messaging is useful for allowing third party components or gadgets embedded in a ...

Endpoint security holes an open door for attackers

Monday, June 23rd, 2008

Everyone knows that there's no such thing as 100% security, but it's unlikely that most businesses realize how insecure they really are. New research on endpoint security shows just how vulnerable corporate networks are. Eighty-one percent of corporate endpoints probed by IT security and control product vendor Sophos failed basic security ...

Best Security Tools: Free online Web utilities

Monday, June 23rd, 2008

Have you ever needed to PING a host, run trace a Web route, or see what information you're exposing to Internet without having to reconfigure the security on your perimeter devices? Have you tired of having to call your managed security services provider to let them know it's you creating ...

Corporate Security Worldwide Fails Basic Tests

Sunday, June 22nd, 2008

Everyone knows that there's no such thing as 100 percent security, but it's unlikely that most businesses realize how insecure they really are. New research on endpoint security shows just how vulnerable corporate networks are. Eighty-one percent of corporate endpoints probed by IT security and control product vendor Sophos failed basic ...

New Zlob Trojan Alters Your Router Settings

Thursday, June 12th, 2008

Another new development in the malware arena, this new version of Zlob will actually log onto your router and change the DNS settings to hijack your traffic. Pretty interesting approach and it will work because 99% of people won’t change the default password on their routers. Let’s face it, have you ...