TITLE

Bell Labs spots security flaw in JavaScript

AUTHOR(S)
Messmer, Ellen; Sliwa, Carol
PUB. DATE
July 1997
SOURCE
Network World;07/14/97, Vol. 14 Issue 28, p8
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reveals that Bell Labs has discovered a security flaw in JavaScript. Accessibility of the browser used in JavaScript; Vulnerability of the language to Trojan horse attacks.
ACCESSION #
9708100744

 

Related Articles

  • Firefox toolkit. Vines, Rose // Australian PC User;Feb2010, Vol. 22 Issue 2, p97 

    The article offers information on the Greasemonkey add-on of Firefox web browser. It is stated that Greasemonkey, which is available at http://tinyurl.com/ynvmda, uses snippets of JavaScript to alter the look of other web sites. It notes that the add-on poses risk to computer security,...

  • Twitter security flawed.  // New Scientist;5/2/2009, Vol. 202 Issue 2706, p17 

    The article reports on the flaws in the security of the microblogging service called Twitter that make its users vulnerable to viruses. According to Graham Cluley of antivirus firm Sophos, the Twitter website is vulnerable to viruses written in the Javascript web-programming language. Another...

  • NEXT-GENERATION BROWSERS: 15 THINGS YOU NEED TO FATHOM. Powell, Thomas A. // Network World;3/30/2009, Vol. 26 Issue 13, p29 

    The article offers things needed to browser market. It includes the Internet Explorer 8 (IE8), which tries to help stem the rising tide of XSS attacks by addressing a Type 1 or non-persistent XSS attacks, the X-FRAME-OPTIONS, which reduces the likelihood of clickjacking efforts being successful...

  • Hacker Target: Flaw-Filled Adobe Reader. Larkin, Erik // PCWorld;Jul2009, Vol. 27 Issue 7, p34 

    The article reveals potential holes and unpatched security vulnerabilities in various applications and programs. One case is Adobe Reader and Acrobat which have holes that are vulnerable to potential attacks. In using the program, turn off JavaScript to help prevent as-yet unpatched security...

  • Untitled. Ashford, Warwick // Computer Weekly;7/21/2009, p21 

    The article reports that Mozilla Corp. is working on a fix for a highly critical vulnerability in its Firefox browser. The vulnerability, which puts users at risk of remote code execution attacks, affects Firefox 3.5, but other versions may also be at risk. Mozilla said an attacker can exploit...

  • Plug Critical Holes in IE and Office. Johnston, Stuart J. // PCWorld;Jun2006, Vol. 24 Issue 6, p55 

    The article provides suggestions for dealing with the security problem in Internet Explorer (IE). Zero-day exploits, where less than a day passes between the revelation of a vulnerability and attacks against it, affects all versions of IE. The flaw adds to a computer's susceptibility to a...

  • Black Hat: Ads Could Provide a Vehicle for Enslaving Your Browser. Kerner, Sean Michael // eWeek;7/31/2013, p3 

    The article presents a research study, conducted by web application security company WhiteHat Security Inc., on JavaScript-driven browser botnet. According to researchers of WhiteHat, internet advertisements that are displayed users across the Web could be the gateway to subjecting the browser...

  • Not Reinventing PKI until We Have Something Better. Farrell, Stephen // IEEE Internet Computing;Sep2011, Vol. 15 Issue 5, p95 

    Although X.509-based PKI has some well-known problems, they're being, or can be, addressed. In the past, those problems led to proposals for reinventing PKI based on other technologies. However, none of the proposals provided sufficient additional benefit to gain broad adoption. While there are...

  • Strict Tempo on Data Security. DAVIES, KEVIN // Bio-IT World;Jan/Feb2010, Vol. 9 Issue 1, p40 

    The article focuses on a technology based on biometrics that solves both the attribution and the distribution problems associated with passwords by looking at the force and tempo of the characters of the password as they are entered, developed by Delfigo Security. A confidence score is being...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics