How are hackers able to hack a target without installing malware? [duplicate]

How do hackers place a RAT or Trojan on the target’s computer without downloading the files to the target computer, just by clicking on a link? Or can they take over the target’s computer by opening a file in the browser without downloadin… Continue reading How are hackers able to hack a target without installing malware? [duplicate]

Securely storing derived key in web app and handling user identity

I am currently working on an open source project to securely store notes, payment card numbers, etc. I would like to implement a zero knowledge encryption method so that no one but the user can decrypt this data.
Unfortunately, I am stuck … Continue reading Securely storing derived key in web app and handling user identity

How can I prevent the browser(s) from revealing screen resolution and plugin list? [migrated]

Screen resolution can be a key aspect in browser fingerprinting; and also installed browser extensions;
Why screen resolution isnt needed at the server:
As a web developer, my SERVER never need to know the screen resolution;
In fact, the s… Continue reading How can I prevent the browser(s) from revealing screen resolution and plugin list? [migrated]

How can I get a count of high risk vulnerabilities of web browsers? [closed]

Every month I’m reading about some zero-day vulnerability being exploited in Google Chrome. I’d like to roughly compare the situation with Firefox in some objective way. It’s ok if it does not fully capture everything (undisclosed vulnerab… Continue reading How can I get a count of high risk vulnerabilities of web browsers? [closed]

Does enabling hardware acceleration increase the attack surface of software?

For software that process untrusted data and have an option to use hardware acceleration, does enabling hardware acceleration increase the attack surface of the software? Examples of situations where typical software process untrusted data… Continue reading Does enabling hardware acceleration increase the attack surface of software?