A complete guide to securing a website

A complete guide to securing a website

To secure a website or a web application, one has to first understand the target application, how it works and the scope behind it.  Ideally, the penetration tester should have some basic knowledge of programming and scripting languages, and also … [+]

Which scan policy should you use to find everything that matters?

Which scan policy should you use to find everything that matters?

If only Web application security were black and white. We could simply load our scanner without thinking anything through, enter the URL, click Scan, generate a report of issues for someone else to address and be done with it. Sadly … [+]

Google XSS Flaw in Website Optimizer Scripts explained

This week thousands of system administrators who make use of Goolge products will open their inbox to see an email from Google explaining that their Web Optimizer product contains an XSS flaw that allows hackers to inject scripts into their Google Optimized web pages.
[+]

DOM based Cross-site Scripting vulnerabilities

DOM based Cross-site Scripting vulnerabilities

While a traditional cross-site scripting vulnerability occurs on the server-side code, document object model based cross-site scripting is a type of vulnerability which affects the script code in the client’s browser. DOM or the document object model is a way … [+]

Statistics from a phisher's list

Statistics from a phisher's list

Yesterday night I was following some security related forums and some person posted a phishing kit for a popular bank from Romania.  A phishing kit is a collection of scripts to help a script kiddie launch a phishing exploit and … [+]

HTTP Post Denial Of Service: more dangerous than initially thought

HTTP Post Denial Of Service: more dangerous than initially thought

Wong Onn Chee and Tom Brennan from OWASP recently published a paper* presenting a new denial of service attack against web servers. What’s special about this denial of service attack is that it’s very hard to fix because it relies … [+]

Notable changes in PCI DSS 2.0 affecting Web application security

Notable changes in PCI DSS 2.0 affecting Web application security

“Clarification, additional guidance, and evolving requirements” – welcome to the new PCI standards! Hot off the press are the new PCI DSS and PA-DSS requirements which take effect January 1, 2011. So, if you work in or around Web application … [+]

Application Security; Don’t get caught off guard with dangerous assumptions

Application Security; Don’t get caught off guard with dangerous assumptions

Don’t get caught off guard. We hear that statement all the time with regards to information security. Sadly, as many businesses have experienced, such talk is cheap. Obviously no one wants their Web site to get hacked. Okay, maybe a … [+]

Preventing phishing attacks is not just a technical issue

Preventing phishing attacks is not just a technical issue

A client of mine who’s a security administrator for a business in the financial industry contacted me recently about some odd behavior he was seeing on his network. Apparently numerous spidering/mirroring requests were being sent to his company’s marketing website … [+]

Internet Voting Trial Thwarted by Hackers

The District of Columbia recently attempted to give the opportunity to number of people who live or work overseas to be able to cast their vote remotely. To do this a secure E-Voting website costing over $300,000 was built. On Tuesday, September 28 2010 the first public trial run was launched. Thirty-six hours later the voting system was hacked by a student. It took nearly three days for D.C officials to realize that their system was compromised. The trial was immediately suspended and red-faced engineers and politicians quickly scrambled to find out how this breach could possibly have happened.
[+]