The End of CoinHive and the Rise of Cryptojacking

CoinHive is a service that was created in September 2017. It allows users to mine Monero cryptocurrency using JavaScript. CoinHive has remarkably changed the income models of content developers over the course of its 18 month-long adventure. However, d… Continue reading The End of CoinHive and the Rise of Cryptojacking

Remote Hardware Takeover via Vulnerable Admin Software

Increased digitization means that web browsers are integral to our daily lives. For example, I’m writing this article on a cloud-based word processing application, whereas a few years ago, I may only have had the option of using an executable des… Continue reading Remote Hardware Takeover via Vulnerable Admin Software

Acquiring Data with CSS Selectors and Javascript on Time Based Attacks

jQuery is a JavaScript library that was released in August 2006 with the motto: ‘write less, do more’. jQuery simplifies the process of writing code in JavaScript by making the element selectors, event chaining and handling easier. It’s safe to s… Continue reading Acquiring Data with CSS Selectors and Javascript on Time Based Attacks

Clickjacking Attack on Facebook: How a Tiny Attribute Can Save the Corporation

The clickjacking attack introduced in 2002 is a UI Redressing attack in which a web page loads another webpage in a low opacity iframe, and cause changes of state when the user unknowingly clicks on the buttons of the webpage. In this article, we expla… Continue reading Clickjacking Attack on Facebook: How a Tiny Attribute Can Save the Corporation

The Importance of the Content-Type Header in HTTP Requests

Dawid Czagan, Founder and CEO at Silesia Security Labs and author of Bug Hunting Millionaire, is listed in HackerOne’s Top 10 Hackers. In a recent article on his website, Czagan disclosed the details of a vulnerability combining both Cross-site R… Continue reading The Importance of the Content-Type Header in HTTP Requests