HackDig : Dig high-quality web security articles for hacker

A Cybersecurity Proof: The Application is the Endpoint

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How m
Publish At:2017-10-21 16:25 | Read:3894 | Comments:0 | Tags:Threats access points application attack vector endpoint End

Making CAPTCHAs Expensive Again: If You’re Using Text-Based CAPTCHAs, You’re Doing It Wrong

CAPTCHAs – these things: A human creation built to foil robots. However, as is ever so common these days, the robots are winning. But! it doesn’t have to be that way.The first CAPTCHAs were created in 2000, and most every CAPTCHA since has remained virtually the same. This becomes problematic when thinking about CAPTCHAs in the context of being security appl
Publish At:2017-03-13 16:15 | Read:3639 | Comments:0 | Tags:Featured Articles Security Awareness application CAPTCHA Mac

Managing Risks of a Hybrid Cloud Environment When You’re A Small Business

First, it was cloud computing that sparked the imaginations of businesses in terms of all the benefits they could receive. Then, came the division of public and private clouds; some companies wanted to keep their cloud on-premise, while others looked to cloud providers. Now, the next step in the cloud revolution has come—the gradual adoption of the hybrid cl
Publish At:2015-06-29 12:05 | Read:4212 | Comments:0 | Tags:Connecting Security to the Business Featured Articles applic

Stark CRM v1.0 Multiple Script Injection And Session Riding Vulnerabilities

Multiple stored XSS and CSRF vulnerabilities exist when parsing user input to several POST parameters. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious w
Publish At:2014-08-13 01:55 | Read:3788 | Comments:0 | Tags:Internal advisory application crm csrf exploit flaw html inj


Share high-quality web security related articles with you:)


Tag Cloud