|
 |
 |
Displaying 11 to 16 of 16 articles |
< Back |
|
Pages:
1
2
|
Articles by Sam White |
11. Safe Penetration Testing - 3 Myths and the Facts behind them!
March 25, 2013
Penetration testing vendors will often make promises and assurances that they can test your Web Applications safely and comprehensively in your production environment. So when performing Penetration Testing of a Web Application that is hosted in a Production Environment you need to consider the foll...
|
 |
 |
12. How MIT website got hacked despite having any vulnerability ?
January 28, 2013
Without getting into who really hacked, the cause behind the hack, I just wanted to dissect it as an interesting case of multi-stage attack which proves that just securing your application is not good enough.
Anatomy of the MIT Hack
Step 1: MIT Network Operations Center (NOC) person ...
|
 |
 |
13. Must Know Business Logic Vulnerabilities In Banking Applications
January 24, 2013
Over the last few years, our On-Demand and Hybrid Penetration Testing platform has performed security testing of applications across various verticals and domains including Banking, e-commerce, Manufacturing, Enterprise Applications, Gaming and so on. On one side, SQL Injection, XSS and CSRF vulnera...
|
 |
 |
14. Using 80-20 Rule in Application Security Management
January 24, 2013
80/20 rule (also known as Pareto Principle) is one of the most beautiful rules which helped me to achieve as well as fail. In most of the cases where I went wrong it finally turned out to be figuring out the “right few”. This is probably one of the most elusive rules. It is easy to understand but ex...
|
 |
 |
15. Web Application Vulnerability Statistics of 2012
January 21, 2013
Web Application Vulnerability Statistics of 2012 With years of experience and valuable insights from our expert security team, we thought of conducting a study to discover the prevailing critical website security trends. So, this report is based on our original research on more than 5000 tests cove...
|
 |
 |
16. (In)Security in Security Products
August 02, 2012
In our last year’s report, we published trends in major security products and security vendors. We concluded with the fact that security products and vendors are as vulnerable and insecure as any other products and vendors respectively. In the year of 2011, some of the major security vendors got tar...
|
 |
 |
|
 |
|
>
|
|
 |
 |
 |
Author Login |
|
 |
Advertiser Login
ADVERTISE HERE NOW!
Limited Time $60 Offer!
90 Days-1.5 Million Views

 |
 |
LEVAL AINAH
I am an internet marketer and also an educator. My goal is to help others who are looking to improve...more
|
 |
 |
 |
 |
STEPHEN BYE
Stephen Bye is a fiction writer. His most recent novels are a 5-book “The Developer” series which be...more
|
 |
 |
 |
 |
TIM FAY
After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
|
 |
 |
 |
 |
GENE MYERS
Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
|
 |
 |
 |
 |
ADRIAN JOELE
I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
|
 |
 |
 |
 |
LAURA JEEVES
At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
|
 |
 |
 |
 |
MICHAEL BRESCIANI
Rev Bresciani is the author of two Christian books. One book is an important and concisely written b...more
|
 |
 |
 |
 |
PAUL PHILIPS
For more articles, blog messages & videos and a free e-book download go to www.NewParadigm.ws your p...more
|
 |
 |
 |
 |
ALEX BELSEY
I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
|
 |
 |
|