Google UI-Redressing Bug That Discloses The User's Email Address
Contributed by Mazin AhmedIn this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an...
View ArticleHacking Techniques: Web Application Security
Contributed by Shynlie SimmonsThis paper focuses on hacking techniques of web applications and how the implementation of security through programming can keep intruders from wreaking havoc on your...
View ArticleUnderstanding Cross Site Scripting
Contributed by Hardik ShahThere are many techniques which a intruder can use to compromise the web applications. One such techniques is called XSS or CSS or cross site scripting. With the help of such...
View ArticleXSS Attacks FAQ
Contributed by Aelphaeis Mangarae a.k.a. Chris MorgantiXSS attacks are becoming a big problem and are going to become an extremely big problem if people do not educate themselves about XSS attacks and...
View ArticleRowHammer
Contributed by Roy schmiedeshoffThis rowhammer bug is a hardware fault found in many DRAM memory modules manufactured from 2010 onward. Basically, continued refreshing rows of memory cells can cause...
View ArticleMalware Behavior & Implementation Strategies: Forms of Malware Attacks &...
Contributed by Andrew L. RamirezThe fight against the latest malware on both client and server side attacks hasn’t ever been as crucial as it is today. Nowadays, the malware we encounter and are...
View ArticleThe Connected Vehicle: Vulnerabilities, Future, and Security
Contributed by Cory ChurchThis paper will focus on the threats and vulnerabilities in the new field of connected cars. With most car manufacturers trying to push out connected cars as quickly as...
View ArticleKeyloggers: A Threat to Your Data
Contributed by Ezequiel GuerraAs more and more people throughout the world utilize the Internet to access their personal data. The greater the chance their data can be stolen. Millions of people access...
View ArticleHacking Back – Offense/Defense in Enterprise IT Security
Contributed by Edgar Hurtado JrOne of the many thoughts that travel through the minds of the computer user are these questions, Am I being hacked? Am I safe to open this email? Am I vulnerable to a...
View ArticleThe Evolution to Fileless Malware
Contributed by David PattenMalware and viruses have been around since the early days of computers. The computer security industry has often played a game of cat and mouse with malware authors in which...
View Article
More Pages to Explore .....