Cross site scripting (XSS) Research Paper By Aarshit Mittal and Harsha Vardhan Bopanna
Cross site scripting (XSS) By Aarshit Mittal and Harsha Vardhan BopannaCross site scripting is a web application based attack generally found in online services, pages of the websites the attack is a temporary attack but can be used by a black hat hacker or a financial cyber fraud for a permanent attack on user’s confidential […] more…Celebrities Are Lures For Scammers
“Just Google it.” You’ve probably heard this phrase a thousand times before, and for good reason—search is one of the top activities we do online[1]. But while you are searching online for information and content, keep in mind that scammers are also searching for victims. Scammers have been very productive in creating fake or infected […] more…McAfee brings you the solution to unauthorized photo-sharing on Facebook
I still remember that day vividly when my teenage daughter finished checking her Facebook account in an amazingly short time! I started to make a snide comment but the look on her face arrested my action. She looked so dejected, so woebegone! Whatever could have spoiled the day so for my little princess? “Nothing,” was […] more…WordPress Security – Cutting Through The BS
I recently spoke at WordCamp Chicago 2012 and did so on WordPress Security. In this post I’ll share my presentation but also provide context such that it allows the reader to better digest the presentations content. Let me know how I do!!! When putting the presentation together I found myself between a rock and hard […] more…After a hack: The process of restoring once-lost data
Mat Honan, a reporter with Wired magazine, thought almost his entire digital life had been lost, but a team of recovery engineers were able to restore most of it by diving deep into his compromised laptop. Here's how they did it. read more more…SiteCheck – Got Blackhat SEO Spam Warning?
As of late it seems like we’re talking about a lot of SPAM related cases, this post will be no different. Before you start, let me preface this by saying that clearing a Blackhat SEO Spam injection is probably the biggest PITA (Google It) infection there is. They constantly evolve, making them difficult to detect […] more…Saudi Aramco says virus shuts down its computer network
Saudi Arabian Oil Co (Saudi Aramco) said its computer systems had been shut down by a virus late on Wednesday, but it added that production had not been affected. “An official source of Saudi Aramco confirmed that it had isolated electronic systems for the entire company today and cut off external access as an early […] more…Keep Your Gadgets Secure During Summer Travel
Traveling isn’t at all fun. Vacationing is fun, but getting there and dealing with taxis, rental cars, airplanes, hotels and all the unfamiliarity can be unpleasant. And in the midst of all this, criminals are on the lookout for people vacationing. You tend to be more relaxed and your “guard” is down. You also may […] more…Automation is Key With Today’s Website Attacks
When trying to undertand the anatomy of attacks on websites you have to break it down into manageable parts. In my mind it really comes down to two types: Targeted and Opportunistic. More important to understand is how the attack is executed, and that’s what I want to spend some time on in this post. […] more…Photo suggests Apple out to ‘screw’ hardware hackers
Apple is designing its own, entirely proprietary screw-head in a bid to prevent punters and repair shops getting inside its future iDevices. At least, it is if – and it’s a very big ‘if’ – you take a piccy posted on the interweb at face value. Tags: Apple Hardware more…Who Are You in The Cloud?
Your online activities say a lot about who you are. A majority of Americans use search engines. Billions of email and instant messaging accounts are created worldwide. One in five minutes spent online is spent on social media. There are almost six billion mobile subscribers in the entire world. A considerable number of those who […] more…Microsoft Office lifestyle: making consumers more like enterprisers
At the Office 2013 event in San Francisco on July 16, Microsoft CEO Steve Ballmer tried to make the case that Office isn’t just about work—it’s a lifestyle brand. Saying, “My entire life is on Office 15 and Windows 8,” Ballmer played up the consumer-focused nature of Office, and its place in Microsoft’s effort to […] more…Backdoor Tool Kit – Today’s Scary Web Malware Reality
We often talk about the importance of keeping your server clean. You can see it in a number of our articles and presentations, this post will likely drive that point home. This past week we came across a nice little package that we felt compelled to share with you. In it, the attacker makes use […] more…Diablo 3 Barbarian God-Mode Exploit Found
A Diablo 3 God mode exploit for the Barbarian class has been discovered. The bug’s been found only a day after users found and abused a similar bug that made Wizards completely invulnerable. The Wizard God-mode exploit took Blizzard almost an entire day to fix, and players were even live streaming their experiences of taking […] more…Pharma Hack Backdoor Analyzed – PHP5.PHP
Some of you might remember my last Pharma hack post, Intelligent (Pharma) SPAM Decoded, today I will spend some time looking a different variant of the same infection type but focus on a payload that is not encoded or embedded within an existing file, instead it resides in its own file – PHP5.php. “Hmm, maybe […] more…US can continue to withhold embassy cables already on WikiLeaks
In a summary judgment, a federal judge ruled on Monday that the United States government can continue to classify and redact 23 embassy cables that have already been released in their entirety by WikiLeaks. Tags: wikileaks Industry News US more…More information
- Update: WebMail Upgrade – June 4, 2018
- 5 active mobile threats spoofing enterprise apps
- Vulcan Cyber Emerges From Stealth With $4 Million Seed Round
- Cops need warrant for both location history and phone pinging, says judge
- Healthcare IT Help Desk Employees Targeted in Payment-Hijacking Attacks
- Social networks to be fined for hosting terrorist content
- Microsoft Internet Explorer CVE-2016-3353 Security Bypass Vulnerability
- Chinese Cyberspies Caught Exploiting VMware ESXi Zero-Day
- Douglas Engelbart, inventor of the computer mouse, has died
- Flash Flaws Most Common in Exploit Kits: Report