This week the cyber warfare stakes in the Middle East were raised a few notches when a Kaspersky Lab (Link) anti-virus expert discovered the Flame virus, which many have dubbed the most advanced and sophisticated cyber weapon ever unleashed. The Flame espionage worm, a previously unknown piece of malware was at the heart of a
Securing your data in an increasingly insecure world is no easy task. Backing up computer data,installing software that protects you from identity theft are just a few things we do to secure our data. Think about it. Why wouldn’t you want to protect your Android Phone? It’s not only if you physically lose your phone
The High Price of Web Application Security What is the true cost of web application security? One CISO might say ‘My entire security solution cost me $40,000’, another might quote a higher price but many companies will simply answer ‘What is the cost of no application security?’
90% of all Custom Built Web Application are Wide Open for Attacks! An astounding 86% of custom built websites are said to have vulnerabilities, said a report issued last week by an American IT company. Nearly 90% of all custom designed web applications tested found positive SQL Injection leaks.
Is fear in the Cloud misplaced? Who’s afraid of the big bad cloud? Everyone apparently! Corporations, Public Companies; the list is endless. Cloud Security is synonymous with problems. When we consider Cloud Security we think about application security and guarding sensitive data. Cloud Security has been one of the things on the front of the
A recent report by the Securities and Exchange Commission (www.sec.gov), indicates that phishing is on the rise. In fact, phishing is the kind of cybercrime an average user is most likely to encounter on a day-to-day basis. Phishing attacks rely on human vulnerabilities, making them more difficult to defend against when compared to viruses, for example. Although
What’s Wrong with the Public Sector? They’re failing OWASP Top 10! OWAP Top 10- the bible of web applicaiton vulnerabilties, the benchmark vulnerabilities by which most organizations should by going by; who’s their worst pupil? The Public Sector.
Lady Gaga keeps her poker face in light of SQL Injection! Lady Gaga’s website had a ‘Bad Romance’ with an SQL Injection attack, revealing the personal details of thousands of fans! The hack was reported more than six months ago and was committed by a group of hackers going under the pseudoname ‘SwagSec’. Even though
Would you Trade your freedom for Application Security? OWASP’s Dan Greer recently gave the keynote speech at the “Application Security Matters’ conference where he delved into the problems and issues arising from the inconsistencies in application security. There are many things which contribute to lousy application security- not taking the necessary steps to protect your