Stealing Data with CSS Selectors and JavaScript | Netsparker

Acquiring Data with CSS Selectors and Javascript on Time Based Attacks

jQuery is a JavaScript library that was released in August 2006 with the motto: 'write less, do more'. jQuery simplifies the process of writing code in JavaScript by making the element selectors, ...
Threat Alert: MalSpam

Threat Alert: MalSpam

Radware researchers have been following multiple campaigns targeting the financial industry in Europe and the United States. These campaigns are designed to commit fraud via credential theft by sending MalSpam, malicious spam ...
E-Discovery in Cloud: Security

E-Discovery in Cloud: Security Issue and Compliance Gaps

E-discovery serves as a reliable method for organizations in accumulating, preserving and organizing data for legal and regulatory compliance. However, advancements in technologies such as containers have invoked security and compliance gap ...
Security Boulevard
10 Most Popular Blogs of 2018

10 Most Popular Blogs of 2018

Between large scale cyberattacks, the implementation of GDPR and increasing popularity of smart home technologies (and their associated vulnerabilities), we had a lot to write about this year. Of the hundreds of ...
Midsized Businesses Need Enterprise-Sized Security

Midsized Businesses Need Enterprise-Sized Security

Though cybersecurity is not a one-size-fits-all proposition, it is also not accurate to say that smaller companies need smaller security. Osterman Research surveyed 900 security pros worldwide and found that 73 percent ...
Security Boulevard
Data of 32 million SKY Brasil customers easily accessible on unprotected ElasticSearch server

Data of 32 million SKY Brasil customers easily accessible on unprotected ElasticSearch server

Brazil’s largest subscription television services company, SKY Brasil, leaked private data of 32 million customers on ElasticSearch, a search engine favored by enterprises, reported independent security researcher Fabio Castro on Twitter last ...

Quantum Computing to Protect Data: Will You Wait and See or Be an Early Adopter?

Time to dispel with a myth: quantum computing is still just a theory. It’s not. If you don’t believe us, read here. And because it’s past the theoretical stage, commercialization is not ...
Consumer Data Protection Act

Consumer Data Protection Act: Forcing Accountability

A U.S. senator wants to make corporate executives held responsible for data breaches that result in the theft or compromise of consumer personally identifiable information (PII). It seems that Oregon Sen. Ron ...
Security Boulevard

DPIAs and why every organisation needs to conduct them

Do you know what a DPIA is? Do you need to conduct one? This blog will give you an introduction to DPIAs and why and when you should conduct one. What is ...

How Secure is Your Digital Presence?

Hacking is now big business for criminals. With the creation and availability of data exploding, it?s time to look at how we got here, and what we can do to secure our ...
Loading...