In the initial days, attacks were focused on the network and operating system vulnerabilities. We have seen many such...
10 Vulnerable web applications for security testing
In this post I am listing a set of vulnerable web applications publicly made available for the purpose of security...
A study about the SQL injection attacks
Imperva has released a report on the anatomy of the SQL injection attacks. Well, its not much about the anatomy, but...
110,000 bank card numbers were stolen via a SQL injection attack
Hackers have broken into the website of the New York tour company CitySights NY and stolen about 110,000 bank card...
Cloud Security vsTwitter Security Incident
The recent incident at the Twitter on the information leakage shall not be considered as a cloud security weakness....
Universal Browser PDF XSS vulnerability
Everyday application security is facing new threats and it challenges the business users. The latest is in the form of...