- How buffer overflow exploits work
- Why buffer overflow vulnerabilities exist
- New buffer overflow exploit techniques, including the
- "return-into-libc" technique
- How organizations can protect themselves against these threats
Download the web seminar slides in PPT format (zipped) here.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.