What Do Compromised Websites Look Like?
Sucuri Blog has an interesting blogpost on how a website got compromised and allowed unencrypted Credit Card numbers(only in one specific area and for a few seconds) to be stolen…
Defend Your Systems
Discussion of public breaches of security
Sucuri Blog has an interesting blogpost on how a website got compromised and allowed unencrypted Credit Card numbers(only in one specific area and for a few seconds) to be stolen…
Newsflash to all CEO’s when do you understand the problem of no mistakes no matter the potential of attack? Bruce Schneier https://www.schneier.com/blog/archives/2015/06/hacking_drug_pu.html Hospira Infusion drug pumps: http://www.hospira.com/en/products_and_services/infusion_pumps/ So the infusion…
Cross Application Resource Access = XARA is another way to hack applications on a computer, it was researched with the following paper: https://drive.google.com/file/d/0BxxXk1d3yyuZOFlsdkNMSGswSGs/view The Mac OSX and iOS operating systems…
Criminal tattoos – these are the guys attacking us. The Criminals have multitude of tools at their disposal, just like anybody with technical aptitude does. And just like water flows…
Chase.com not verified Commercial.hsbc.hk not verified (Hong Kong) pnc verified. Here are Three examples when clicking on the lock to the left of the URL in the browser … example…