Java vulnerabilities and zero day exploits are very common these days. It has take to the extend that security experts start recommending disabling the Java whenever possible. Now Java has…
In the initial days, attacks were focused on the network and operating system vulnerabilities. We have seen many such attacks resulting in network unavailability, information disclosure, denial of service etc...…
In this post I am listing a set of vulnerable web applications publicly made available for the purpose of security testing and training. Google Gruyere for Web Application Exploits and…
Imperva has released a report on the anatomy of the SQL injection attacks. Well, its not much about the anatomy, but more about how, from where and when are the…
Hackers have broken into the website of the New York tour company CitySights NY and stolen about 110,000 bank card numbers.They used the SQL Injection attack to get into the…
The recent incident at the Twitter on the information leakage shall not be considered as a cloud security weakness. Reading through various blogs and the description from Twitter , it…
Everyday application security is facing new threats and it challenges the business users. The latest is in the form of XSS attacks; where an application serving PDF files are vulnerable…