On the December 2012, an Egyptian hacker who calls himself ViruS_HimA claimed to have breached Yahoo!’s security systems and acquire full access to certain...
Hi, what are you looking for?
On the December 2012, an Egyptian hacker who calls himself ViruS_HimA claimed to have breached Yahoo!’s security systems and acquire full access to certain...
Last week, Ruby on Rails (RoR), a popular web application framework, was reported as vulnerable to critical vulnerabilities.
From hackers’ point of view, launching a successful attack, either malware based or through web application hacking, requires an investment in infrastructure. The infrastructure...
While Anti-Virus Solutions Are Effective in Fighting Widespread Malware, There is a Good Chance Newer Malware Will Evade Those Solutions.
Last week, South Carolina’s (SC) Governor presented the results of the investigation over the exposure of the personal data of nearly 4 million individual...
DKIM, or DomainKeys Identified Mail, is a protocol created to allow mail services to verify the authenticity of the mail messages they deliver.
Last week, Mozilla removed the latest version of their Firefox Web browser just a day after it was released. The reason? A security vulnerability...
Google has always had a sharp nose for rising Internet trends. Just recently, the search giant announced that it had acquired VirusTotal, an anti-malware...
Lately, there has been a lot of commotion around Java vulnerabilities. Late last month, security researchers discovered zero-day java vulnerabilities being actively exploited in...
A Vulnerability Management (VM) program is commonly defined as the “cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities" . According to Gartner’s report...
Hackers’ Investment in Evasion Techniques Proves That They See Web Applications as a Valuable Attack Surface
The World Wide Web (WWW) has come a long way during the last decade. By contrast, the HTTP protocol, which provides the communication application...