Watch out for PHP holes

Poorly written PHP sites make them the target of attacks

What to do

1. Web application filters are a good first step to protecting your Web applications from malicious tampering, but they don't catch everything. Bill Boni strongly recommends ongoing training in coding best practices for all Web developers regardless of the development language they use. "Code reviews, application-level security scanning and rigorous security testing against your Web applications are all essential," he adds.

2. Keep your browsers patched and updated, since the malicious code gets in through vulnerabilities in the browser, Chris Shiflett says. "If you can, get on a less used and less targeted browser, a really solid and mature browser like Opera, Safari or Firefox," he says.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

More about BillCircuit CityHISIBM AustraliaInternet Security SystemsMotorolaSecurity SystemsWebsense

Show Comments

Featured Whitepapers

Editor's Recommendations

Brand Page

Stories by Deb Radcliff

Latest Videos

More videos

Blog Posts