A typical Web application is the target of an attack at least one in three days on average,according to a report released by data security firm Imperva. The third edition of Imperva's semi-annual Web Application Attack ...
Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale online. In the past year, cyber criminals have used ...
Tags: Protection, Cyber Crime, Products
IT security budgets are not being used to provide defence technology in some of the areas the enterprise is most likely to need it in, a study has revealed. About 33% of hacker forum discussions are about training and tutorials for data ...
Tags: IT, Hacker, Computer Products, IT Security
SQL injection (SQLi) attacks rose 69% in the second quarter of 2012 compared with the previous quarter, according to the latest report from secure cloud hosting firm FireHost. FireHost said that, between April and June, it blocked nearly ...
Tags: SQL injection, SQLi attacks, FireHost, secure cloud hosting
Cross-site scripting(XSS)attacks remain the top threat to web applications,databases and websites,an analysis of 15 million cyber attacks in the third quarter of 2012 has revealed. Other top attack techniques are directory traversals,SQL ...
Tags: XSS, Web Applications, CSRF, Cross-site attacks