Application security January 20, 2012 Arthur Reese A Few Words on Malware – The Sality Way Malware comes in different sizes and shapes. Trojans, worms, viruses, downloaders, and others are becoming more common than common cold medicine. These malware...
Hacking January 19, 2012 Prateek Gianchandani Hacking web authentication – Part 2 In the first part of this article we looked at some of the common authentication types used in Web Applications these days and discussed their pros and cons....
Application security January 16, 2012 Prateek Gianchandani Inserting Vulnerabilities in Web Applications In this article we will look at how we can insert vulnerabilities in web applications. Why? There are basically two reasons. Firstly, it allows us to see...
Hacking January 12, 2012 Jethro Inwald The THC SSL DoS Threat Ever since computers became ubiquitous and affordable they have attracted malicious users as well as those who use computers for altruistic purposes. These malicious users– sometimes called “black hats” or “crackers”– often try and take servers, desktops or entire networks offline using something called a Denial of Service attack or “DoS.”
Hacking January 10, 2012 Jaideep Jha Fail-Open Authentication in IT Security Fail-open authentication is the situation when the user authentication fails but results in providing open access to authenticated and secure sections...
Application security January 10, 2012 Sudhanshu Chauhan Cross-Site Scripting (XSS) Web applications today suffer from a variety of vulnerabilities. Cross-Site Scripting (XSS) is one of the most prevalent web application security flaws, yet...
Penetration testing January 9, 2012 Mike Sheward The art of writing penetration test reports You close the lid of your laptop; it's been a productive couple of days. There are a few things that could be tightened up, but overall the place isn't doing...
Digital forensics January 7, 2012 Satish B. iPhone Forensics [highlight color="blue"]Interested in formal iPhone forensics training? Check out our 3 day iPhone and iOS forensics course now available. [/highlight] iPhone...
Digital forensics January 5, 2012 Mike Sheward Rock Solid: Will Digital Forensics Crack SSDs? Digital forensics is one of the most interesting and exciting fields of information security that you can ever be fortunate enough to work in, but not for the...
Application security January 4, 2012 Parul Garg Fuzzing – Application and File Fuzzing In our first article, we reviewed the basics of fuzzing as well as the mutation and generation technique. We have also introduced the PeachFuzzer, which we...