Quantcast
Channel: InfoSecWriters.com - Exploitation
Browsing latest articles
Browse All 23 View Live

Image may be NSFW.
Clik here to view.

Google UI-Redressing Bug That Discloses The User's Email Address

Contributed by Mazin AhmedIn this post, I will be talking about an interesting bug that affects Google Blogger. This security bug has been left undiscovered since almost 2007. The bug allows an...

View Article



Image may be NSFW.
Clik here to view.

Hacking Techniques: Web Application Security

Contributed by Shynlie SimmonsThis paper focuses on hacking techniques of web applications and how the implementation of security through programming can keep intruders from wreaking havoc on your...

View Article

Image may be NSFW.
Clik here to view.

Understanding Cross Site Scripting

Contributed by Hardik ShahThere are many techniques which a intruder can use to compromise the web applications. One such techniques is called XSS or CSS or cross site scripting. With the help of such...

View Article

Image may be NSFW.
Clik here to view.

XSS Attacks FAQ

Contributed by Aelphaeis Mangarae a.k.a. Chris MorgantiXSS attacks are becoming a big problem and are going to become an extremely big problem if people do not educate themselves about XSS attacks and...

View Article

Image may be NSFW.
Clik here to view.

RowHammer

Contributed by Roy schmiedeshoffThis rowhammer bug is a hardware fault found in many DRAM memory modules manufactured from 2010 onward. Basically, continued refreshing rows of memory cells can cause...

View Article


Image may be NSFW.
Clik here to view.

Malware Behavior & Implementation Strategies: Forms of Malware Attacks &...

Contributed by Andrew L. RamirezThe fight against the latest malware on both client and server side attacks hasn’t ever been as crucial as it is today. Nowadays, the malware we encounter and are...

View Article

Image may be NSFW.
Clik here to view.

The Connected Vehicle: Vulnerabilities, Future, and Security

Contributed by Cory ChurchThis paper will focus on the threats and vulnerabilities in the new field of connected cars. With most car manufacturers trying to push out connected cars as quickly as...

View Article

Image may be NSFW.
Clik here to view.

Keyloggers: A Threat to Your Data

Contributed by Ezequiel GuerraAs more and more people throughout the world utilize the Internet to access their personal data. The greater the chance their data can be stolen. Millions of people access...

View Article


Image may be NSFW.
Clik here to view.

Hacking Back – Offense/Defense in Enterprise IT Security

Contributed by Edgar Hurtado JrOne of the many thoughts that travel through the minds of the computer user are these questions, Am I being hacked? Am I safe to open this email? Am I vulnerable to a...

View Article


Image may be NSFW.
Clik here to view.

The Evolution to Fileless Malware

Contributed by David PattenMalware and viruses have been around since the early days of computers. The computer security industry has often played a game of cat and mouse with malware authors in which...

View Article
Browsing latest articles
Browse All 23 View Live




Latest Images