Getting Back to Basics with Web Security

It’s usually the simple things in life that create the most problems – we’ve all learned this universal law the hard way. Be it slick tires when driving in the rain, that extra decimal point when doing our taxes, or a bad Ethernet patch cable that’s discovered after hours of computer troubleshooting, it seems that […]

Read More →

Patching Servers is Not Enough

Patches and vulnerabilities Patches are pieces of code designed to fix ‘bugs’, enable additional functionality or address security flaws in operating systems and applications. Timely installation of patches on web servers and applications is generally recognized as critical to the success of website availability and security, especially considering the speed at which exploits are discovered. […]

Read More →

Why you should be Concerned about Web Security

Ever since the Heartbleed bug disaster, you’d think companies are becoming more vigilant with their web security plan. Recent events seem to show evidence to the contrary, with millions of users’ data left exposed to cyber-attacks on popularly used websites, including a government website and eBay. Security flaws in Australian government website Security researcher Nik […]

Read More →

Analysis of an Intrusion: Backdoors

The concept of “Backdoor” has seen many interpretations during the relatively short history of the Internet. Microsoft defines Backdoors as “A hidden entrance to a computer system that can be used to bypass security policies”, and, in essence, that is what they are. A Backdoor allows an attacker to access a remote computer, bypassing authentication […]

Read More →

Vulnerable Network Devices: A Growing Concern

Network devices, except maybe firewalls, are not usually perceived as security sensitive assets. Manufacturers and users do not invest time in assessing the security state of routers and switches. IT admins, handling business IT infrastructures, are mainly concerned with uptime when it comes to network devices. The usual tasks revolve around backup / restore of […]

Read More →

What You Don’t Know About Web Security CAN Hurt You

How secure is your web environment? You know, your business’ marketing website, your customer-facing web applications, your internal financials application, the various cloud services that process and store business assets, and so on. Many business executives don’t have the slightest idea about the security of these critical business systems. They view this as a technical […]

Read More →

Negative Impacts of Automated Vulnerability Scanners and How to Prevent them

Automated web application vulnerability scanners are constantly being used in order to automatically identify vulnerabilities such as Cross-Site Scripting (XSS) and SQL Injection on web applications. Although automated vulnerability scanners have become an indispensable tool for pen-testers and security consultants, they could sometimes have a negative impact on your scan target. An automated scan damaged […]

Read More →

The Results are in – Verizon 2014 Data Breach Investigations Report

The numbers are in… and cybercrime had quite an active 2013 according to Verizon’s 2014 Data Breach Investigations Report (DBIR) – one of the information security industry’s most prominent studies compiled from over 50 contributing organizations. This year’s report includes an array of security issues, from denial of service (DOS) attacks to web application attacks […]

Read More →