In recent SEC filings, VeriSign revealed they were repeatedly hacked during 2010. Though the company did not divulge what type of data was breached,...
Hi, what are you looking for?
In recent SEC filings, VeriSign revealed they were repeatedly hacked during 2010. Though the company did not divulge what type of data was breached,...
2011 Year in Review: Seven Prime Hacks and Why They are Significant
Using a Common Password? Online Password Crackers are Effective Even with Services that Have Strict Lock-out Policies.
Business Logic Attacks - Stealthly, and Often Hard to Call Illegal, These Fraudulent Attacks Can Cost Organizations Big Money
IP Blacklisting is not as Black or White as it sounds. IP Intelligence Should to be Used to Help flag Malicious Attack Sources.
My previous column emphasized the most prevalent attack techniques used by hackers. By studying thse types of attacks we can enhance our solutions. Here’s...
Three of the four most prevalent attack techniques observed were used by LulzSec during their summer hacking rampage.
In my previous column I presented five commonly used weapons in arsenals of security researchers. This week, we complete the list with a mix...
Building Better Defenses is Hard to do Without the Right Tools
Sin City, A.K.A Las Vegas, Nevada – is once again playing host this week to the Black Hat and DEFCON security conferences. With throngs...
We’re seeing a fast-growing trend in the hacking community that, sadly, many aren’t noticing: search engines can be turned into tools for attackers in...