Inside the Mind of a Hacker: Attacking Web Pages With Cross-Site Scripting

Web application developers must learn to think like cybercriminals to combat the growing threat of cross-site scripting (XSS) attacks.

The post Inside the Mind of a Hacker: Attacking Web Pages With Cross-Site Scripting appeared first on Security Intelligence.

Continue reading Inside the Mind of a Hacker: Attacking Web Pages With Cross-Site Scripting

Impressions From DEF CON 24: The Machines Are Rising

The machines rose at DEF CON 24 in Las Vegas. Autonomous hacking machines successfully analyzed, patched and exploited software at the conference.

The post Impressions From DEF CON 24: The Machines Are Rising appeared first on Security Intelligence.

Continue reading Impressions From DEF CON 24: The Machines Are Rising

Inside the Mind of a Hacker: Attacking the Memory

A savvy hacker may identify vulnerabilities that lead to memory attacks. Learn what contributes to these issues and best practices for avoiding them.

The post Inside the Mind of a Hacker: Attacking the Memory appeared first on Security Intelligence.

Continue reading Inside the Mind of a Hacker: Attacking the Memory

Inside the Mind of a Hacker: Attacking the Shell

To better prevent command injection attacks, developers need to learn how to think like a hacker and identify weak points in software.

The post Inside the Mind of a Hacker: Attacking the Shell appeared first on Security Intelligence.

Continue reading Inside the Mind of a Hacker: Attacking the Shell

Inside the Mind of a Hacker: Attacking Databases With SQL Injection

Hackers frequently use SQL injection as a means of attacking and taking over databases. Here’s what you need to know to avoid this type of breach.

The post Inside the Mind of a Hacker: Attacking Databases With SQL Injection appeared first on Security Intelligence.

Continue reading Inside the Mind of a Hacker: Attacking Databases With SQL Injection