SQL Injection has long been identified as one of the top vulnerabilities affecting web applications. Even though SQL Injection attack vectors are well known, it’s an attack that keeps…
While most Americans enjoyed a long holiday weekend, researchers in the security community were working around the clock to unravel the mysteries of one of the most intimidating pieces of…
What would happen if you lost your wallet to a thief? It’s a question that Google Wallet users on Android phones are asking themselves in the wake of multiple reports…
Exploits that take advantage of SQL Injection (SQLi) vulnerabilities in software are among the most dangerous and prevalent attacks on the Internet today. In a SQLi attack, hackers typically take…
Editor’s Note: An updated version of this article can be found here: Which Browser is Best for Security? For as long as there has been more than one browser, users…
In the battle against malicious traffic and infected websites, security researchers are always looking for new avenues of detection. According to Trustwave Security Researcher Rodrigo Montoro, one such approach could…
SSL is supposed to protect web users by encrypting data. When it comes to trusting an SSL certificate, Web browsers rely on authoritative certificate authorities (CA) that validate the authenticity…
The open source WordPress blogging application is being updated to version 3.1.3 this week adding multiple security fixes and improvements. Among the fixes is a moderately critical patch for arbitrary…
Web Application Firewall (WAF) technology is seen by manyas a much needed technology for Web application security. In the open source world, the ModSecurity project has helped to lead the…
Cross-site scripting (XSS) and SQL injection flaws are among the most common and lethal types of security vulnerabilities. Both sets of flaws often stem from the same root cause, which…
Get the free newsletter
Subscribe to Cybersecurity Insider for top news, trends & analysis