Fuzzy Security

Increasing numbers of exploited application vulnerabilities are being blamed on organized use of "fuzzing" by hackers. Secure Computing researchers say hackers use the same artificial intelligence tools that developers use to automatically test inputs to generate lists of abnormal results.


The Metasploit Project is attempting to show the seriousness of the issue by using the method to find and release a vulnerability in Microsoft Internet Explorer for each day in July. The speed at which hackers share information spells trouble for vendors trying to keep up with patching.

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.



Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data