“Osama Bin Laden Dead” Computer Security Tips: Black-Hat Search Engine Optimization (BH-SEO)
/
0 Comments
After every major news event in recent years, such as the “Haiti Earthquake”, "Japanese tsunami", "William and Kate Wedding" and now, "Osama Bin Laden dead" an increase of fraudulent web sites, links and files offering to provide information and unseen video, pictures come to a rise via emails and social networking sites.
Introducing SAINT for MAC OS X
Vulnerability Scanning -
Assess any target with an IPv4, IPv6, or URL with pre-defined policies for PCI, HIPAA, FISMA, and more. Identify CVE, OSVDB, IAVA, OVAL, and more.
Penetration Testing -
Exploit vulnerabilities to gain remote access. Run social engineering, phishing assessments, and more with the exploit tools suite.
Browser History Hijacking Flaw
Browser history hijacking is a flaw in a web browser that allows certain websites access to all the sites a user has ever visited. This is a techniques used by sporting, news, movie, financial and porn websites to better place ads and check to see if you have visited any of their competitors.
Web Application Security: An Overview
Web developers typically do not have any formal training in the area of security and their priorities usually lie elsewhere. Business functionality and meeting tight deadlines are typically the focus areas of developers and security is often forgotten, or at most, an afterthought. This leaves the door wide open for attackers to discover vulnerabilities and exploit them to gain access to sensitive data.