In recent years, Web application security has become a focal center for security experts. Application attacks are constantly on the rise, posing new risks for the organization. One of the most dangerous and most common attack techniques is SQL Injection, which usually allows the hacker to obtain full access to the organization´s Database.
One of the most infamous computer viruses of all time was the Friday 13 virus. The reason it was given this name is very simple: this is the date when it deleted all the files with an .EXE extension from affected computers.
This paper discusses the possibility of automated, self-propagating attacks on custom Web application code. It will show that such attacks are not only feasible but that their theoretical success rate is far greater than worms targeting commercial infrastructure. It is the intent of this paper to raise awareness of the threat posed by automated attacks… Read More »
Many companies are just now beginning to realize the importance of web application security. Some are learning the hard way. Most veteran security professionals are aware of common Unix applications that have been historically vulnerable such as versions of BIND/DNS, FTP, Sendmail and Apache Web Server.
The use of ethical hackers to test for security vulnerabilities is as old as the IT hills. But, unless there are clear goals outlining why and to what extent your organization is engaging them, the outcome could be useless information — or worse.
Nowadays, with Wireless enabled computers almost as common as Ethernet, it makes sense to more people and organizations to make the next step and connect their networks using wireless technology. If you or your community is planning to get online using wireless network technology, Flickenger’s book “Building Wireless Community Networks” is exactly where you need… Read More »