Detecting and Preventing Social Engineering and other Hacking Processes

January 21, 2009 0 Comments 0 tags

Social engineering attacks are growing fast, and today majority of attackers use social engineering techniques to infiltrate into a victim’s network. It is very difficult for a technician to identify

SQL injection Basic Tutorial

January 20, 2009 0 Comments 0 tags

One of the major problems with SQL is its poor security issues surrounding is the login and url strings.this tutorial is not going to go into detail on why these

[Paper XSS] Vulnerabilities in Common Shockwave Flash Files

January 20, 2009 0 Comments 0 tags

SummaryCritical vulnerabilities exist in a large number of widely used web authoring tools that automatically generate Shockwave Flash (SWF) files, such as Adobe (r) Dreamweaver (r), Abobe Contribute (r), Adobe

DNS disaster: first attacks reported

January 19, 2009 0 Comments 0 tags

The first attacks that are likely to have stemmed from a serious Domain Name System flaw have been reported. Dan Kaminsky (Credit: Kaminsky’s blog) The existence of the Domain Name

New phishing scam targets high level executives

January 19, 2009 0 Comments 0 tags

A new phishing attack has been circulating lately, but instead of trying to dupe millions of computer users into giving up their financial information, this one is aimed at high

Webmasters misery after the website got hacked; Google sandbox, Hosting dismissal and much more

January 17, 2009 0 Comments 0 tags

Hello, I run a websites on graphics design, greeting cards and website design. Most of the items are free for visitors and I make my money from advertisement using Adsense.

Its not just war; its cyber war! Israel and Gaza engaged in cyber war

January 17, 2009 0 Comments 0 tags

News of cyber war fare is reported from the warzone! News bases sites, telecommunication etc are the initial targets on both sides. Israel and the Arab world are showing mastery