Game publisher Ubisoft in hot water due to serious security threat Ubisoft is a household name synonymous with fantastic, exciting games and also with a zero tolerance approach to game piracy. The company has been plagued with problems recently after the Uplay network has been absolutely overloaded with issues; outages, technical issues and now security!
DARPA funded hacking device ready for release The Defense Advanced Projects Research Agency (DARPA) has just finished funding a new device called The Power Pwn. The new device which is cunningly concealed as a regular power strip is anything but! The new device is actually a Hacking tool for launching remotely-activated WI-Fi, Bluetooth and Ethernet
Yahoo left red-faced after SQL injection vulnerability reveals nearly half a million passwords! A hacking group who name themselves ‘DD3Ds Company’ have, within the last few days leaked 453,492 yahoo text passwords for Yahoo accounts. DD3Ds Company now claim that they attained the passwords by means of SQL injection against a poorly secured Yahoo subdomain. Security
Cyber Attacks on ATM and online banking are at an all time high Cyber Attacks which are aimed at online banking applications are at an all time high, according to several security experts. Unsurprisingly, almost one third of all attacks were aimed at banks which reside in the Gulf, where the banks are swelling with oil
What are the Top Flaws in Web Applications? When it comes to security, web applications are consistently the most vulnerable to penetration. Here are some of the top flaws in web applications:
The Open Web Application Security Project (OWASP) is an open-source application security community whose goal is to spread awareness surrounding the security of applications, best known for releasing the industry standard OWASP Top 10. The OWASP community is powered by security knowledgeable volunteers from corporations, educational organizations, and individuals from around the world. This community works to create
The fact that it’s easier to hack than protect is no secret. For example, attackers need to find a single point of entry, whereas the defender needs to close all holes. As most of you know, defenders usually work under tight time and budget constraints, while the attacker has no such limitations. He has full discretion to decide how